Vulnerability Description
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inhandnetworks | Ir615 Firmware | 2.3.0.r4724 |
| Inhandnetworks | Ir615 | - |
Related Weaknesses (CWE)
References
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05Third Party AdvisoryUS Government Resource
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-38462?
CVE-2021-38462 is a vulnerability with a CVSS score of 9.8 (CRITICAL). InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and ...
How severe is CVE-2021-38462?
CVE-2021-38462 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-38462?
Check the references section above for vendor advisories and patch information. Affected products include: Inhandnetworks Ir615 Firmware, Inhandnetworks Ir615.