Information disclosure in TP-Link T2600G-28SQ



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-28368
CWE-ID CWE-255
Exploitation vector Local network
Public exploit N/A
Vulnerable software
T2600G-28SQ
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor TP-Link

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Credentials management

EUVDB-ID: #VU73774

Risk: Low

CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-28368

CWE-ID: CWE-255 - Credentials Management

Exploit availability: No

Description

The vulnerability allows a remote attacker can compromise the target system.

The vulnerability exists due to the affected software uses vulnerable SSH host keys. A remote attacker on the local network can obtain credential information for the target device

Mitigation

Install updates from vendor's website.

Vulnerable software versions

T2600G-28SQ: All versions

CPE2.3 External links

https://jvn.jp/en/jp/JVN62420378/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###