Password Storage Vulnerability in Draytek Vigor Routers
CVE-2024-41336
7.5HIGH
Summary
Several models of Draytek Vigor routers have been found to improperly store passwords in plaintext, exposing sensitive information to unauthorized access. This vulnerability affects multiple versions across the Vigor series, increasing the risk of credential compromise. Users are strongly advised to update their devices to the latest firmware versions to mitigate this security issue.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved