First published: Tue Oct 19 2021(Updated: )
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Ir615 Firmware | =2.3.0.r4724 | |
Inhandnetworks Ir615 | ||
Inhandnetworks Ir615 Firmware | =2.3.0.r4870 | |
InHand Networks IR615 Router: Versions 2.3.0.r5417 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38476 is a vulnerability in the authentication process of InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 that allows an attacker to enumerate different user accounts.
CVE-2021-38476 impacts InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 by indicating and validating the existence of a username, which can be exploited to enumerate user accounts.
CVE-2021-38476 has a severity rating of 5.3 (Medium).
To fix CVE-2021-38476, it is recommended to update to a newer version of InHand Networks IR615 Router firmware that addresses the authentication process vulnerability.
More information about CVE-2021-38476 can be found on the official US-CERT Advisory: ICSA-21-280-05.