CVE-2023-0750
CVSS V2 None
CVSS V3 None
Description
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
Overview
- CVE ID
- CVE-2023-0750
- Assigner
- vulnerability@ncsc.ch
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-06T14:15:07
- Last Modified Date
- 2023-04-18T17:49:35
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:lynx-technik:yellobrik_pec_1864_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:lynx-technik:yellobrik_pec_1864:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0750 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0750 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:16:30 | Added to TrackCVE | |||
2023-04-17 04:16:33 | Weakness Enumeration | new | ||
2023-04-18 19:01:22 | 2023-04-18T17:49:35 | CVE Modified Date | updated | |
2023-04-18 19:01:22 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-18 19:01:26 | Weakness Enumeration | update | ||
2023-04-18 19:01:28 | CPE Information | updated |