10
CVSSv2

CVE-2015-0932

Published: 05/04/2015 Updated: 15/04/2015
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The ANTlabs InnGate firmware on IG 3100, IG 3101, InnGate 3.00 E, InnGate 3.01 E, InnGate 3.02 E, InnGate 3.10 E, InnGate 3.01 G, and InnGate 3.10 G devices does not require authentication for rsync sessions, which allows remote malicious users to read or write to arbitrary files via TCP traffic on port 873.

Vulnerable Product Search on Vulmon Subscribe to Product

antlabs inngate ig 3.02 e

antlabs inngate ig 3.10 e

antlabs inngate ig 3.10 g

antlabs inngate ig 3101

antlabs inngate ig 3.01 e

antlabs inngate ig 3100

antlabs inngate ig 3.00 e

Recent Articles

Hotel Wi-Fi not only hideously expensive – it's horribly insecure
The Register • Iain Thomson in San Francisco • 27 Mar 2015

Wide-open rsync blunder leaves popular gateways vulnerable to hijacking

Travelers are used to getting screwed over by hotel internet access. But it's not just the eye-watering Wi-Fi prices guests should be worried about. A major security flaw in a network gateway popular among hoteliers can be exploited by hackers to launch attacks against guests by injecting malware into their downloads over unencrypted connections. Compromised gateways can also be used to infiltrate sensitive areas of a hotel's network, such as its reservation systems, it's claimed. The vulnerabil...