Information disclosure in Lantronix Device Server

Published: 2012-10-14 00:00:00 | Updated: 2017-12-06
Severity Low
Patch available NO
Number of vulnerabilities 1
CVE ID N/A
CVSSv3 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software Lantronix Device Server
Vulnerable software versions Lantronix Device Server 5.8.0.1
Vendor URL Lantronix

Security Advisory

1) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to the module retrieves the setup record from Lantronix serial-to-ethernet devices via the config port (30718/udp, enabled by default) and extracts the telnet password. A remote attacker can sending a specially crafted request to port 30718, obtain these passwords and perform further attacks.

Remediation

Cybersecurity Help is currently unaware of any solution addressing the vulnerability.

External links

https://github.com/rapid7/metasploit-framework/commit/79da6c7186d659cb08d6f3df85ddd75f4863ce14#diff-...

Back to List