Planet Technology Corp NVR-915/NVR-1615 Telnet Server hard-coded credentials
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.6 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Planet Technology Corp NVR-915 and NVR-1615 and classified as critical. The affected element is an unknown function of the component Telnet Server. Performing a manipulation results in hard-coded credentials. This vulnerability is known as CVE-2020-26097. Remote exploitation of the attack is possible. No exploit is available. The affected component should be upgraded. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Details
A vulnerability classified as very critical has been found in Planet Technology Corp NVR-915 and NVR-1615 (the affected version unknown). This affects an unknown part of the component Telnet Server. The manipulation with an unknown input leads to a hard-coded credentials vulnerability. CWE is classifying the issue as CWE-798. The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was published 11/18/2020. The advisory is shared at sec-research.com. This vulnerability is uniquely identified as CVE-2020-26097. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/04/2024). MITRE ATT&CK project uses the attack technique T1110.001 for this issue.
Upgrading eliminates this vulnerability.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Support
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.6
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Hard-coded credentialsCWE: CWE-798 / CWE-259 / CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
09/24/2020 🔍11/18/2020 🔍
11/18/2020 🔍
08/04/2024 🔍
Sources
Advisory: sec-research.comStatus: Confirmed
CVE: CVE-2020-26097 (🔍)
GCVE (CVE): GCVE-0-2020-26097
GCVE (VulDB): GCVE-100-165105
Entry
Created: 11/18/2020 10:15 PMUpdated: 08/04/2024 07:24 PM
Changes: 11/18/2020 10:15 PM (36), 12/08/2020 06:55 PM (5), 12/08/2020 07:00 PM (16), 08/04/2024 07:24 PM (17)
Complete: 🔍
Cache ID: 244:A3D:40
No comments yet. Languages: en.
Please log in to comment.