CVE-2021-28909

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers to access uncontrolled the login service at /webif/SecurityModule in a brute force attack. The password could be weak and default username is known as 'admin'. This is usable and part of an attack chain to gain SSH root access.
References
Link Resource
https://psytester.github.io/CVE-2021-28909 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*

History

21 Sep 2021, 13:39

Type Values Removed Values Added
CPE cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*
cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 9.8
CWE CWE-307
References (MISC) https://psytester.github.io/CVE-2021-28909 - (MISC) https://psytester.github.io/CVE-2021-28909 - Third Party Advisory

09 Sep 2021, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-09 18:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-28909

Mitre link : CVE-2021-28909

CVE.ORG link : CVE-2021-28909


JSON object : View

Products Affected

bab-technologie

  • eibport
  • eibport_firmware
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts