First published: Thu Oct 07 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
InHand Networks IR615 Router | ||
Inhand Networks IR615 Firmware | =2.3.0.r4724 | |
Inhand Networks IR615 Firmware | ||
Inhand Networks IR615 Firmware | =2.3.0.r4870 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38474 is classified as a medium-severity vulnerability due to the lack of an account lockout policy, allowing for potential brute-force attacks.
To mitigate CVE-2021-38474, implement an account lockout policy on the InHand Networks IR615 Router and ensure to update to the latest firmware version.
CVE-2021-38474 affects the InHand Networks IR615 Router firmware versions 2.3.0.r4724 and 2.3.0.r4870.
Yes, CVE-2021-38474 can potentially allow attackers to gain unauthorized access through brute-force password attempts.
Yes, users should check for firmware updates that address the vulnerability in the InHand Networks IR615 Router.