Vulnerabilities > Use of Hard-coded Credentials

DATE CVE VULNERABILITY TITLE RISK
2018-05-09 CVE-2016-9335 Use of Hard-coded Credentials vulnerability in Redlion products
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190.
network
low complexity
redlion CWE-798
critical
10.0
2018-05-08 CVE-2017-17540 Use of Hard-coded Credentials vulnerability in Fortinet Fortiwlc
The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.
network
low complexity
fortinet CWE-798
critical
9.8
2018-05-08 CVE-2017-17539 Use of Hard-coded Credentials vulnerability in Fortinet Fortiwlc
The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
network
low complexity
fortinet CWE-798
critical
9.8
2018-05-05 CVE-2018-10723 Use of Hard-coded Credentials vulnerability in Rangerstudio Directus 6.4.9
Directus 6.4.9 has a hardcoded admin password for the Admin account because of an INSERT statement in api/schema.sql.
network
low complexity
rangerstudio CWE-798
critical
9.8
2018-05-04 CVE-2018-8857 Use of Hard-coded Credentials vulnerability in Philips products
Philips Brilliance CT software (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) contains fixed credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
local
low complexity
philips CWE-798
7.8
2018-05-03 CVE-2018-10167 Use of Hard-coded Credentials vulnerability in Tp-Link EAP Controller 2.5.4/2.6.0
The web application backup file in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows is encrypted with a hard-coded cryptographic key, so anyone who knows that key and the algorithm can decrypt it.
network
high complexity
tp-link CWE-798
7.5
2018-05-02 CVE-2018-6401 Use of Hard-coded Credentials vulnerability in Meross Mss110 Firmware 1.1.24
Meross MSS110 devices before 1.1.24 contain a TELNET listener providing access for an undocumented admin account with a blank password.
network
low complexity
meross CWE-798
critical
9.8
2018-05-01 CVE-2017-14014 Use of Hard-coded Credentials vulnerability in Bostonscientific Zoom Latitude PRM 3120 Firmware
Boston Scientific ZOOM LATITUDE PRM Model 3120 uses a hard-coded cryptographic key to encrypt PHI prior to having it transferred to removable media.
low complexity
bostonscientific CWE-798
4.6
2018-04-30 CVE-2018-10575 Use of Hard-coded Credentials vulnerability in Watchguard Ap100 Firmware, Ap102 Firmware and Ap200 Firmware
An issue was discovered on WatchGuard AP100, AP102, and AP200 devices with firmware before 1.2.9.15.
network
low complexity
watchguard CWE-798
critical
9.8
2018-04-24 CVE-2017-9656 Use of Hard-coded Credentials vulnerability in Philips Dosewise 1.1.7.333/2.1.1.3069
The backend database of the Philips DoseWise Portal application versions 1.1.7.333 and 2.1.1.3069 uses hard-coded credentials for a database account with privileges that can affect confidentiality, integrity, and availability of the database.
network
low complexity
philips CWE-798
critical
9.1