7.5
CVSSv3

CVE-2020-28331

Published: 24/11/2020 Updated: 12/07/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

barco wepresent_wipg-1600w_firmware 2.5.1.8

Exploits

Barco wePresent WiPG-1600W versions 2518, 25025, 25024, and 24119 have firmware that does not perform verification of digitally signed firmware updates and is susceptible to processing and installing modified/malicious images ...
Barco wePresent WiPG-1600W versions 2518, 25025, 25024, and 24119 have a hardcoded root password hash included in the firmware image ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> KL-001-2020-009 : Barco wePresent Insecure Firmware Image <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: ...