Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2024-09-30 CVE-2024-8456 Missing Authentication for Critical Function vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices.
network
low complexity
planet CWE-306
critical
9.8
2024-09-30 CVE-2024-8457 Cross-site Scripting vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack.
network
low complexity
planet CWE-79
4.8
2024-09-30 CVE-2024-8458 Cross-Site Request Forgery (CSRF) vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF).
network
low complexity
planet CWE-352
8.8
2024-09-30 CVE-2024-8459 Cleartext Storage of Sensitive Information vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials.
network
low complexity
planet CWE-312
4.9
2024-09-30 CVE-2024-9329 Open Redirect vulnerability in Eclipse Glassfish
In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'.
network
low complexity
eclipse CWE-601
6.1
2024-09-30 CVE-2024-8448 Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote attackers with regular privilege to log in with this credential and obtain a Linux root shell.
network
low complexity
planet CWE-798
8.8
2024-09-30 CVE-2024-8449 Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.
low complexity
planet CWE-798
6.8
2024-09-30 CVE-2024-8450 Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized remote attackers to use this community string to access the SNMPv1 service with read-write privileges.
network
low complexity
planet CWE-798
critical
9.8
2024-09-30 CVE-2024-8451 Improper Handling of Insufficient Permissions or Privileges vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate users from accessing the SSH service.
network
low complexity
planet CWE-280
7.5
2024-09-30 CVE-2024-8452 Reversible One-Way Hash vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology only support obsolete algorithms for authentication protocol and encryption protocol in the SNMPv3 service, allowing attackers to obtain plaintext SNMPv3 credentials potentially.
network
low complexity
planet CWE-328
7.5