Lucene search

K
vulnrichmentCERT-InVULNRICHMENT:CVE-2024-41686
HistoryJul 26, 2024 - 11:45 a.m.

CVE-2024-41686 Password Policy Bypass Vulnerability

2024-07-2611:45:18
CWE-179
CERT-In
github.com
5
cve-2024-41686
syrotech
password policy bypass
router
security standards
local attacker
exploitation

CVSS4

7.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to improper implementation of password policies. A local attacker could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.

Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.

CNA Affected

[
  {
    "vendor": "SyroTech",
    "product": "SyroTech SY-GPON-1110-WDONT router",
    "versions": [
      {
        "status": "affected",
        "version": "3.1.02-231102"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*"
    ],
    "vendor": "syrotech",
    "product": "sy-gpon-1110-wdont_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "3.1.02-231102"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

7.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-41686