Vulnerabilities > Planet > GS 4210 24P2S Firmware > Medium

DATE CVE VULNERABILITY TITLE RISK
2024-09-30 CVE-2024-8453 Use of a One-Way Hash without a Salt vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted.
network
low complexity
planet CWE-759
4.9
2024-09-30 CVE-2024-8455 Inadequate Encryption Strength vulnerability in Planet products
The swctrl service is used to detect and remotely manage PLANET Technology devices.
network
high complexity
planet CWE-326
5.9
2024-09-30 CVE-2024-8457 Cross-site Scripting vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack.
network
low complexity
planet CWE-79
4.8
2024-09-30 CVE-2024-8459 Cleartext Storage of Sensitive Information vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials.
network
low complexity
planet CWE-312
4.9
2024-09-30 CVE-2024-8449 Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware
Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password.
low complexity
planet CWE-798
6.8