Vulnerability Description
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Barco | Wepresent Wipg-1600W Firmware | 2.4.1.19 |
| Barco | Wepresent Wipg-1600W | - |
Related Weaknesses (CWE)
References
- https://korelogic.com/Resources/Advisories/KL-001-2020-004.txtExploitThird Party Advisory
- https://korelogic.com/Resources/Advisories/KL-001-2020-004.txtExploitThird Party Advisory
FAQ
What is CVE-2020-28329?
CVE-2020-28329 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticat...
How severe is CVE-2020-28329?
CVE-2020-28329 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-28329?
Check the references section above for vendor advisories and patch information. Affected products include: Barco Wepresent Wipg-1600W Firmware, Barco Wepresent Wipg-1600W.