WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html | third party advisory exploit |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2019/Jul/9 | mailing list exploit third party advisory |