CVE-2021-35961

Dr. ID Door Access Control and Personnel Attendance Management system uses the hard-code admin default credentials that allows remote attackers to access the system through the default password and obtain the highest permission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:secom:dr.id_access_control:*:*:*:*:*:*:*:*

History

02 Aug 2021, 17:40

Type Values Removed Values Added
CPE cpe:2.3:a:secom:dr.id_access_control:*:*:*:*:*:*:*:*
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
References (MISC) https://www.chtsecurity.com/news/2e4e69d5-2e32-4f73-ac7e-a66432e020e4 - (MISC) https://www.chtsecurity.com/news/2e4e69d5-2e32-4f73-ac7e-a66432e020e4 - Third Party Advisory
References (MISC) https://www.twcert.org.tw/tw/cp-132-4905-c99ac-1.html - (MISC) https://www.twcert.org.tw/tw/cp-132-4905-c99ac-1.html - Third Party Advisory

16 Jul 2021, 16:55

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-16 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-35961

Mitre link : CVE-2021-35961

CVE.ORG link : CVE-2021-35961


JSON object : View

Products Affected

secom

  • dr.id_access_control
CWE
CWE-798

Use of Hard-coded Credentials