Vulnerabilities > Planet > GS 4210 24P2S Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-30 | CVE-2024-8454 | Resource Exhaustion vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware The swctrl service is used to detect and remotely manage PLANET Technology devices. | 7.5 |
2024-09-30 | CVE-2024-8458 | Cross-Site Request Forgery (CSRF) vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF). | 8.8 |
2024-09-30 | CVE-2024-8448 | Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote attackers with regular privilege to log in with this credential and obtain a Linux root shell. | 8.8 |
2024-09-30 | CVE-2024-8451 | Improper Handling of Insufficient Permissions or Privileges vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate users from accessing the SSH service. | 7.5 |
2024-09-30 | CVE-2024-8452 | Reversible One-Way Hash vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology only support obsolete algorithms for authentication protocol and encryption protocol in the SNMPv3 service, allowing attackers to obtain plaintext SNMPv3 credentials potentially. | 7.5 |