CVE-2024-8455
moderate-risk
Published 2024-09-30
The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.
Do I need to act?
-
0.21% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (3)
Gs-4210-24P2S Firmware
Gs-4210-24Pl4C Firmware
Igs-5225-4Up1T2S Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.twcert.org.tw/en/cp-139-8060-f3955-2.html
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-8059-bde5f-1.html
34
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
9/34 · Low