Vulnerability Description
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Planet | Gs-4210-24P2S Firmware | < 3.305b240802 |
| Planet | Gs-4210-24P2S | 3.0 |
| Planet | Gs-4210-24Pl4C Firmware | < 2.305b240719 |
| Planet | Gs-4210-24Pl4C | 2.0 |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/en/cp-139-8048-f0e4d-2.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-8047-adf79-1.htmlThird Party Advisory
FAQ
What is CVE-2024-8449?
CVE-2024-8449 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console...
How severe is CVE-2024-8449?
CVE-2024-8449 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8449?
Check the references section above for vendor advisories and patch information. Affected products include: Planet Gs-4210-24P2S Firmware, Planet Gs-4210-24P2S, Planet Gs-4210-24Pl4C Firmware, Planet Gs-4210-24Pl4C.