5.5
CVE-2021-28858
- EPSS 0.03%
- Veröffentlicht 15.06.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:20
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tp-link ≫ Tl-wpa4220 Firmware Version4.0.2 Updatebuild_20180308_rel.37064
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.057 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
CWE-312 Cleartext Storage of Sensitive Information
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.