CVE-2024-54749

Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: this is disputed by the Supplier because the observation only established that a password is present in a firmware image; however, the device cannot be deployed without setting a new password during installation.
Configurations

No configuration.

History

12 Dec 2024, 02:08

Type Values Removed Values Added
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) Se descubrió que Ubiquiti U7-Pro 7.0.35 contiene una vulnerabilidad de contraseña codificada en /etc/shadow, que permite a los atacantes iniciar sesión como superusuario. NOTA: el proveedor lo niega porque la observación solo estableció que hay una contraseña en una imagen de firmware; sin embargo, el dispositivo no se puede implementar sin configurar una nueva contraseña durante la instalación.

07 Dec 2024, 23:15

Type Values Removed Values Added
Summary (en) Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. (en) Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: this is disputed by the Supplier because the observation only established that a password is present in a firmware image; however, the device cannot be deployed without setting a new password during installation.

06 Dec 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-06 17:15

Updated : 2024-12-12 02:08


NVD link : CVE-2024-54749

Mitre link : CVE-2024-54749

CVE.ORG link : CVE-2024-54749


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials