- EPSS 0.4%
- Veröffentlicht 28.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:07:02
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
CVE-2020-16260
- EPSS 0.21%
- Veröffentlicht 28.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:07:03
Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation.
CVE-2020-16261
- EPSS 0.04%
- Veröffentlicht 28.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:07:03
Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access.
CVE-2020-16262
- EPSS 0.04%
- Veröffentlicht 28.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:07:03
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.
CVE-2020-16263
- EPSS 0.31%
- Veröffentlicht 28.10.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:07:03
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
CVE-2020-16256
- EPSS 0.15%
- Veröffentlicht 28.10.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:07:02
The API on Winston 1.5.4 devices is vulnerable to CSRF.
CVE-2020-16258
- EPSS 0.04%
- Veröffentlicht 28.10.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:07:02
Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.
- EPSS 6.27%
- Veröffentlicht 28.10.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:07:02
Winston 1.5.4 devices are vulnerable to command injection via the API.