Vulnerability CVE-2017-14021


Published: 2017-10-31   Modified: 2017-11-01

Description:
A Use of Hard-coded Cryptographic Key issue was discovered in Korenix JetNet JetNet5018G version 1.4, JetNet5310G version 1.4a, JetNet5428G-2G-2FX version 1.4, JetNet5628G-R version 1.4, JetNet5628G version 1.4, JetNet5728G-24P version 1.4, JetNet5828G version 1.1d, JetNet6710G-HVDC version 1.1e, and JetNet6710G version 1.1. An attacker may gain access to hard-coded certificates and private keys allowing the attacker to perform man-in-the-middle attacks.

Type:

CWE-798

Vendor: Korenix
Product: Jetnet6710g-hvdc firmware 
Version: 11e;
Product: Jetnet5310g firmware 
Version: 1.4a;
Product: Jetnet5428g-2g-2fx firmware 
Version: 1.4;
Product: Jetnet5628g-r firmware 
Version: 1.4;
Product: Jetnet5628g firmware 
Version: 1.4;
Product: Jetnet5728g-24p firmware 
Version: 1.4;
Product: Jetnet5018g firmware 
Version: 1.4;
Product: Jetnet5828g firmware 
Version: 1.1d;
Product: Jetnet6710g firmware 
Version: 1.1;

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://www.securityfocus.com/bid/101598
https://ics-cert.us-cert.gov/advisories/ICSA-17-299-01

Related CVE
CVE-2019-9725
The Web manager (aka Commander) on Korenix JetPort 5601 and 5601f devices has Persistent XSS via the Port Alias field under Serial Setting.
CVE-2017-14027
A Use of Hard-coded Credentials issue was discovered in Korenix JetNet JetNet5018G version 1.4, JetNet5310G version 1.4a, JetNet5428G-2G-2FX version 1.4, JetNet5628G-R version 1.4, JetNet5628G version 1.4, JetNet5728G-24P version 1.4, JetNet5828G ver...
CVE-2012-4577
The Linux firmware image on (1) Korenix Jetport 5600 series serial-device servers and (2) ORing Industrial DIN-Rail serial-device servers has a hardcoded password of "password" for the root account, which allows remote attackers to obtain administrat...

Copyright 2019, cxsecurity.com

 

Back to Top