Security Flaw in LevelOne WBR-6012 Allows for Easily Guessable Administrator Password
CVE-2024-31151

9.8CRITICAL

Key Information:

Vendor

Levelone

Status
Vendor
CVE Published:
30 October 2024

What is CVE-2024-31151?

A notable vulnerability affects the LevelOne WBR-6012 due to hard-coded credentials within its web services. Attackers can exploit this flaw within the first 30 seconds after the device boots up, allowing for unauthorized access. Furthermore, specific conditions can force a reboot of the device, enabling exploitation of this security issue outside the initial timeframe. The flawed implementation exposes a known password string that can be easily located in the firmware, leading to potential security breaches. Once adversaries gain access, they can manipulate user credentials, leveraging additional weaknesses identified in related vulnerabilities. Effective remediation and immediate attention are crucial to mitigate risks associated with this flaw.

Affected Version(s)

WBR-6012 R0.40e6

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto and Patrick DeSantis of Cisco Talos.
.