First published: Mon Oct 01 2018(Updated: )
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auto-maskin Rp 210e Firmware | ||
Arm Arm7 | <3.7 | |
Auto-maskin Rp 210e | ||
Auto-maskin Dcu 210e Firmware | ||
Auto-Maskin DCU 210E | ||
Auto-maskin Marine Pro Observer |
The devices should implement TLS for authentication to administrator functions via embedded webserver.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.