Information disclosure in Lantronix Device Server

Published: 2012-10-14 00:00:00 | Updated: 2017-12-06 12:00:53
Severity Low
Patch available NO
Number of vulnerabilities 1
CVE ID N/A
CVSSv3 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-200
Exploitation vector Network
Public exploit Not available
Vulnerable software Lantronix Device Server
Vulnerable software versions Lantronix Device Server 5.8.0.1
Vendor URL Lantronix

Security Advisory

1) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to the module retrieves the setup record from Lantronix serial-to-ethernet devices via the config port (30718/udp, enabled by default) and extracts the telnet password. A remote attacker can sending a specially crafted request to port 30718, obtain these passwords and perform further attacks.

Remediation

Cybersecurity Help is currently unaware of any solution addressing the vulnerability.

External links

https://github.com/rapid7/metasploit-framework/commit/79da6c7186d659cb08d6f3df85ddd75f4863ce14#diff-...

Back to List