CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.
AnalysisAI
HTTP Basic Authentication over unencrypted connections in the device's embedded web interface allows attackers on the same network to passively intercept and capture user credentials. This cleartext transmission of authentication data exposes administrative access to network-based eavesdropping attacks. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify and inventory all affected devices; restrict network access to device web interfaces to trusted administrative networks only. Within 7 days: Implement network segmentation to isolate affected devices on a separate VLAN with strict access controls; disable remote access to device interfaces if not operationally necessary. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today