Vulnerability Description
Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root password hash included in the firmware image. Exploiting CVE-2020-28329, CVE-2020-28330 and CVE-2020-28331 could potentially be used in a simple and automated exploit chain to go from unauthenticated remote attacker to root shell.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Barco | Wepresent Wipg-1600W Firmware | 2.4.1.19 |
| Barco | Wepresent Wipg-1600W | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-RooExploitThird Party AdvisoryVDB Entry
- https://korelogic.com/Resources/Advisories/KL-001-2020-008.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/160163/Barco-wePresent-Global-Hardcoded-RooExploitThird Party AdvisoryVDB Entry
- https://korelogic.com/Resources/Advisories/KL-001-2020-008.txtExploitThird Party Advisory
FAQ
What is CVE-2020-28334?
CVE-2020-28334 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root pas...
How severe is CVE-2020-28334?
CVE-2020-28334 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-28334?
Check the references section above for vendor advisories and patch information. Affected products include: Barco Wepresent Wipg-1600W Firmware, Barco Wepresent Wipg-1600W.