Vulnerabilities > CVE-2020-28331 - Unspecified vulnerability in Barco Wepresent Wipg-1600W Firmware 2.5.1.8
Summary
Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Hardware | 1 |
References
- http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html
- http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Interface.html
- https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt
- https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt