First published: Tue Nov 24 2020(Updated: )
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barco wePresent WiPG-1600W firmware | =2.4.1.19 | |
Barco wePresent WiPG-1600W firmware | =2.5.0.24 | |
Barco wePresent WiPG-1600W firmware | =2.5.0.25 | |
Barco wePresent WiPG-1600W firmware | =2.5.1.8 | |
Barco wePresent WiPG-1600W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28329 is a vulnerability in the Barco wePresent WiPG-1600W firmware that includes a hardcoded API account and password.
A malicious actor can exploit CVE-2020-28329 by using the hardcoded API account and password to access authenticated, administrative functions in the API.
The affected versions of Barco wePresent WiPG-1600W firmware are 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19.
CVE-2020-28329 has a severity rating of 9.8 (critical).
You can find more information about CVE-2020-28329 at the following reference link: [https://korelogic.com/Resources/Advisories/KL-001-2020-004.txt]