NET&SYS MNG2120J 5.76.1006c and MNG6300 5.83.6305jrc2 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
References
| Link | Resource |
|---|---|
| https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
| https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
| https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
| https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv - Third Party Advisory | |
| References | () https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html - Exploit, Third Party Advisory |
14 Sep 2023, 16:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Telaum ming6300 Firmware
Telaum ming2120j Telaum ming6300 Telaum Telaum ming2120j Firmware |
|
| CPE | cpe:2.3:o:net-wave:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:* cpe:2.3:o:net-wave:ming2120j_firmware:5.76.1006c:*:*:*:*:*:*:* cpe:2.3:h:net-wave:ming6300:2.0:*:*:*:*:*:*:* |
cpe:2.3:o:telaum:ming2120j_firmware:5.76.1006c:*:*:*:*:*:*:* cpe:2.3:h:telaum:ming6300:2.0:*:*:*:*:*:*:* cpe:2.3:h:telaum:ming2120j:4.10:*:*:*:*:*:*:* cpe:2.3:o:telaum:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:* |
Information
Published : 2018-12-23 21:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20396
Mitre link : CVE-2018-20396
CVE.ORG link : CVE-2018-20396
JSON object : View
Products Affected
telaum
- ming6300_firmware
- ming2120j_firmware
- ming6300
- ming2120j
CWE
CWE-522
Insufficiently Protected Credentials
