The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
Solution:
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://r.sec-consult.com/imageaccess | third party advisory |
https://www.imageaccess.de/?page=SupportPortal&lang=en | patch |