Vulnerabilities > Planet > GS 4210 24Pl4C Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-30 | CVE-2024-8453 | Use of a One-Way Hash without a Salt vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. | 4.9 |
2024-09-30 | CVE-2024-8454 | Resource Exhaustion vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware The swctrl service is used to detect and remotely manage PLANET Technology devices. | 7.5 |
2024-09-30 | CVE-2024-8455 | Inadequate Encryption Strength vulnerability in Planet products The swctrl service is used to detect and remotely manage PLANET Technology devices. | 5.9 |
2024-09-30 | CVE-2024-8456 | Missing Authentication for Critical Function vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices. | 9.8 |
2024-09-30 | CVE-2024-8457 | Cross-site Scripting vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack. | 4.8 |
2024-09-30 | CVE-2024-8458 | Cross-Site Request Forgery (CSRF) vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF). | 8.8 |
2024-09-30 | CVE-2024-8459 | Cleartext Storage of Sensitive Information vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials. | 4.9 |
2024-09-30 | CVE-2024-8448 | Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote attackers with regular privilege to log in with this credential and obtain a Linux root shell. | 8.8 |
2024-09-30 | CVE-2024-8449 | Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password. | 6.8 |
2024-09-30 | CVE-2024-8450 | Use of Hard-coded Credentials vulnerability in Planet Gs-4210-24P2S Firmware and Gs-4210-24Pl4C Firmware Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized remote attackers to use this community string to access the SNMPv1 service with read-write privileges. | 9.8 |