Vulnerabilities > Use of Hard-coded Credentials

DATE CVE VULNERABILITY TITLE RISK
2017-01-09 CVE-2016-10125 Use of Hard-coded Credentials vulnerability in Dlink Dgs-1100 Firmware 1.01.018
D-Link DGS-1100 devices with Rev.B firmware 1.01.018 have a hardcoded SSL private key, which allows man-in-the-middle attackers to spoof devices by hijacking an HTTPS session.
network
high complexity
dlink CWE-798
8.1
2017-01-06 CVE-2015-2867 Use of Hard-coded Credentials vulnerability in Trane Comfortlink II Firmware 2.0.2
A design flaw in the Trane ComfortLink II SCC firmware version 2.0.2 service allows remote attackers to take complete control of the system.
network
low complexity
trane CWE-798
critical
10.0
2017-01-04 CVE-2016-10115 Use of Hard-coded Credentials vulnerability in Netgear products
NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo Q devices with firmware 1.8.0_5551 and earlier, and Arlo Q Plus devices with firmware 1.8.1_6094 and earlier have a default password of 12345678, which makes it easier for remote attackers to obtain access after a factory reset or in a factory configuration.
network
low complexity
netgear CWE-798
critical
10.0
2016-12-14 CVE-2016-3685 Use of Hard-coded Credentials vulnerability in SAP Download Manager 1.1.3.0/2.1.142
SAP Download Manager 2.1.142 and earlier generates an encryption key from a small key space on Windows and Mac systems, which allows context-dependent attackers to obtain sensitive configuration information by leveraging knowledge of a hardcoded key in the program code and a computer BIOS serial number, aka SAP Security Note 2282338.
local
sap CWE-798
1.9
2016-12-09 CVE-2016-9013 Use of Hard-coded Credentials vulnerability in multiple products
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
network
low complexity
djangoproject canonical fedoraproject CWE-798
critical
9.8
2016-12-09 CVE-2016-6829 Use of Hard-coded Credentials vulnerability in multiple products
The trove service user in (1) Openstack deployment (aka crowbar-openstack) and (2) Trove Barclamp (aka barclamp-trove and crowbar-barclamp-trove) in the Crowbar Framework has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors.
7.5
2016-11-30 CVE-2016-2948 Use of Hard-coded Credentials vulnerability in IBM Bigfix Remote Control 9.1.2
IBM BigFix Remote Control before 9.1.3 allows local users to discover hardcoded credentials via unspecified vectors.
local
low complexity
ibm CWE-798
4.6
2016-10-05 CVE-2016-7560 Use of Hard-coded Credentials vulnerability in Fortinet Fortiwlc
The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
network
low complexity
fortinet CWE-798
critical
10.0
2016-09-24 CVE-2016-6532 Use of Hard-coded Credentials vulnerability in Dexis Imaging Suite 10.0
DEXIS Imaging Suite 10 has a hardcoded password for the sa account, which allows remote attackers to obtain administrative access by entering this password in a DEXIS_DATA SQL Server session.
network
low complexity
dexis CWE-798
critical
10.0
2016-09-21 CVE-2016-6530 Use of Hard-coded Credentials vulnerability in Dentsply Sirona CDR Dicom
Dentsply Sirona (formerly Schick) CDR Dicom 5 and earlier has default passwords for the sa and cdr accounts, which allows remote attackers to obtain administrative access by leveraging knowledge of these passwords.
network
low complexity
dentsply-sirona CWE-798
critical
10.0