CVE-2020-28331
moderate-risk
Published 2020-11-24
Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots.
Do I need to act?
-
0.68% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Int...
Third Party Advisory
https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt
Third Party Advisory
http://packetstormsecurity.com/files/160162/Barco-wePresent-Undocumented-SSH-Int...
Third Party Advisory
https://korelogic.com/Resources/Advisories/KL-001-2020-007.txt
33
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal