CRITICAL · 9.8

CVE-2020-21995

Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.

Vulnerability Description

Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
InimSmartliving 505 Firmware<= 6.0
InimSmartliving 505-
InimSmartliving 515 Firmware<= 6.0
InimSmartliving 515-
InimSmartliving 1050 Firmware<= 6.0
InimSmartliving 1050-
InimSmartliving 1050G3 Firmware<= 6.0
InimSmartliving 1050G3-
InimSmartliving 10100L Firmware<= 6.0
InimSmartliving 10100L-
InimSmartliving 10100Lg3 Firmware<= 6.0
InimSmartliving 10100Lg3-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-21995?

CVE-2020-21995 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.

How severe is CVE-2020-21995?

CVE-2020-21995 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2020-21995?

Check the references section above for vendor advisories and patch information. Affected products include: Inim Smartliving 505 Firmware, Inim Smartliving 505, Inim Smartliving 515 Firmware, Inim Smartliving 515, Inim Smartliving 1050 Firmware.