CVE-2016-4521

Sixnet BT-5xxx and BT-6xxx M2M devices before 3.8.21 and 3.9.x before 3.9.8 have hardcoded credentials, which allows remote attackers to obtain access via unspecified vectors.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-16-147-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:h:sixnet:bt-5_series_cellular_router:-:*:*:*:*:*:*:*
cpe:2.3:h:sixnet:bt-6_series_cellular_router:-:*:*:*:*:*:*:*
OR cpe:2.3:o:sixnet:bt-5_series_cellular_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sixnet:bt-5_series_cellular_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sixnet:bt-6_series_cellular_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sixnet:bt-6_series_cellular_router_firmware:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-05-31 01:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-4521

Mitre link : CVE-2016-4521

CVE.ORG link : CVE-2016-4521


JSON object : View

Products Affected

sixnet

  • bt-6_series_cellular_router
  • bt-6_series_cellular_router_firmware
  • bt-5_series_cellular_router_firmware
  • bt-5_series_cellular_router
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor