First published: Tue Nov 24 2020(Updated: )
Barco wePresent WiPG-1600W devices use Hard-coded Credentials (issue 2 of 2). Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19. The Barco wePresent WiPG-1600W device has a hardcoded root password hash included in the firmware image. Exploiting CVE-2020-28329, CVE-2020-28330 and CVE-2020-28331 could potentially be used in a simple and automated exploit chain to go from unauthenticated remote attacker to root shell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barco wePresent WiPG-1600W firmware | =2.4.1.19 | |
Barco wePresent WiPG-1600W firmware | =2.5.0.24 | |
Barco wePresent WiPG-1600W firmware | =2.5.0.25 | |
Barco wePresent WiPG-1600W firmware | =2.5.1.8 | |
Barco wePresent WiPG-1600W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28334 is a vulnerability that affects Barco wePresent WiPG-1600W devices and allows the use of hard-coded credentials.
CVE-2020-28334 has a severity rating of 9.8, which is considered critical.
The affected versions of Barco wePresent WiPG-1600W firmware are 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19.
Exploiting CVE-2020-28334 allows unauthorized access to affected Barco wePresent WiPG-1600W devices.
To mitigate the vulnerability, it is recommended to update the Barco wePresent WiPG-1600W firmware to a non-vulnerable version.