Advertisement






Programi Bilanc Build 007 Release 014 31.01.2020 Weak Default Password

CVE Category Price Severity
CVE-2020-11720 CWE-307 Unknown Unknown
Author Risk Exploitation Type Date
Unknown Unknown Remote 2020-12-19
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020120138

Below is a copy:

Programi Bilanc Build 007 Release 014 31.01.2020 Weak Default Password
Programi Bilanc - Build 007 Release 014 31.01.2020 - Use of weak default Password

===============================================================================

Identifiers

-------------------------------------------------

CVE-2020-11720

Vendor

-------------------------------------------------

Balanc Shpk (https://bilanc.com)

Product

-------------------------------------------------

Programi Bilanc

Affected versions

-------------------------------------------------

Programi Bilanc - Build 007 Release 014 31.01.2020 and possibly below

Credit

-------------------------------------------------

Georg Ph E Heise (@gpheheise) / Lufthansa Industry Solutions (@LHIND_DLH)

Vulnerability summary

-------------------------------------------------

The installation sets up admin accounts with weak default credentials

Technical details

------------------------------------------------

During the installation, it sets up administrative access by default with the account admin and password 0000. After the installation, users/admins are not prompted to change this password.

Proof of concept

-------------------------------------------------

Withheld

Solution

-------------------------------------------------

Dont use the software in its current version & contact vendor for a solution

Timeline

-------------------------------------------------

Date| Status

------------|-----------------------------

01APR-2020 | Reported to vendor

30-JUN-2020 | End of 90 Days Full Disclosure Time

17-DEZ-2020 | Full disclosure


Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.