First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir615 Firmware | =2.3.0.r4724 | |
Inhandnetworks Ir615 | ||
Inhandnetworks Ir615 Firmware | =2.3.0.r4870 | |
InHand Networks IR615 Router: Versions 2.3.0.r5417 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38462 is considered a medium severity vulnerability due to its risk of credential enumeration and potential unauthorized access.
To mitigate CVE-2021-38462, users should upgrade to the latest firmware version that enforces a strong password policy.
CVE-2021-38462 affects InHand Networks IR615 Router versions 2.3.0.r4724 and 2.3.0.r4870.
Yes, CVE-2021-38462 can allow attackers to enumerate passwords and impersonate other users, resulting in account takeover.
CVE-2021-38462 is a software vulnerability present in the firmware of the InHand Networks IR615 Router.