First published: Sat Dec 17 2005(Updated: )
The web interface for American Power Conversion (APC) PowerChute Network Shutdown performs all communication in cleartext (base64-encoded), which allows remote attackers to sniff authentication credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Network Shutdown Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4326 is considered a high severity vulnerability due to the risk of credential exposure.
CVE-2005-4326 allows remote attackers to sniff unencrypted authentication credentials transmitted by the APC PowerChute Network Shutdown interface.
To fix CVE-2005-4326, it is recommended to implement secure communication protocols and configure encryption for data transmission.
CVE-2005-4326 affects systems running the APC PowerChute Network Shutdown software that communicate without encryption.
Yes, users should check for updates from APC for any patches that address CVE-2005-4326 vulnerabilities.