First published: Tue Nov 24 2020(Updated: )
Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barco wePresent WiPG-1600W firmware | =2.5.1.8 | |
Barco wePresent WiPG-1600W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-28331.
The severity of CVE-2020-28331 is high with a CVSS score of 7.5.
The Barco wePresent WiPG-1600W firmware version 2.5.1.8 is affected.
Barco wePresent WiPG-1600W devices have an improper access control vulnerability.
No, the SSH daemon is disabled by default and does not start at system boot.
Yes, you can refer to the following links for more information: [Packet Storm Security](http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html) and [KoreLogic Advisory](https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt).