CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Security Vulnerabilities Related To CWE-798

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2023-27583 798 2023-03-13 2023-03-17
0.0
None ??? ??? ??? ??? ??? ???
PanIndex is a network disk directory index. In Panindex prior to version 3.1.3, a hard-coded JWT key `PanIndex` is used. An attacker can use the hard-coded JWT key to sign JWT token and perform any actions as a user with admin privileges. Version 3.1.3 has a patch for the issue. As a workaround, one may change the JWT key in the source code before compiling the project.
2 CVE-2023-26511 798 2023-03-14 2023-03-20
0.0
None ??? ??? ??? ??? ??? ???
A Hard Coded Admin Credentials issue in the Web-UI Admin Panel in Propius MachineSelector 6.6.0 and 6.6.1 allows remote attackers to gain access to the admin panel Propiusadmin.php, which allows taking control of the affected system.
3 CVE-2023-26462 798 +Priv 2023-02-23 2023-03-03
0.0
None ??? ??? ??? ??? ??? ???
ThingsBoard 3.4.1 could allow a remote attacker to gain elevated privileges because hard-coded service credentials (usable for privilege escalation) are stored in an insecure format. (To read this stored data, the attacker needs access to the application server or its source code.)
4 CVE-2023-25823 798 2023-02-23 2023-03-07
0.0
None ??? ??? ??? ??? ??? ???
Gradio is an open-source Python library to build machine learning and data science demos and web applications. Versions prior to 3.13.1 contain Use of Hard-coded Credentials. When using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`), a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides. This issue is patched in version 3.13.1, however, users are recommended to update to 3.19.1 or later where the FRP solution has been properly tested.
5 CVE-2023-24155 798 2023-02-03 2023-02-10
0.0
None ??? ??? ??? ??? ??? ???
TOTOLINK T8 V4.1.5cu was discovered to contain a hard code password for the telnet service which is stored in the component /web_cste/cgi-bin/product.ini.
6 CVE-2023-24149 798 2023-02-03 2023-02-10
0.0
None ??? ??? ??? ??? ??? ???
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for root which is stored in the component /etc/shadow.
7 CVE-2023-24147 798 2023-02-03 2023-02-10
0.0
None ??? ??? ??? ??? ??? ???
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini.
8 CVE-2023-24022 798 2023-01-26 2023-02-04
0.0
None ??? ??? ??? ??? ??? ???
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
9 CVE-2023-23132 798 2023-02-01 2023-02-08
0.0
None ??? ??? ??? ??? ??? ???
Selfwealth iOS mobile App 3.3.1 is vulnerable to Sensitive key disclosure. The application reveals hardcoded API keys.
10 CVE-2023-22495 798 Bypass 2023-01-14 2023-01-24
0.0
None ??? ??? ??? ??? ??? ???
Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.
11 CVE-2023-22463 798 2023-01-04 2023-01-10
0.0
None ??? ??? ??? ??? ??? ???
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
12 CVE-2023-22344 798 Exec Code 2023-03-06 2023-03-13
0.0
None ??? ??? ??? ??? ??? ???
Use of hard-coded credentials vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to obtain the password of the debug tool and execute it. As a result of exploiting this vulnerability with CVE-2023-22335 and CVE-2023-22336 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device.
13 CVE-2023-21426 798 2023-02-09 2023-02-21
0.0
None ??? ??? ??? ??? ??? ???
Hardcoded AES key to encrypt cardemulation PINs in NFC prior to SMR Jan-2023 Release 1 allows attackers to access cardemulation PIN.
14 CVE-2023-20038 798 2023-01-20 2023-02-01
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in the monitoring application of Cisco Industrial Network Director could allow an authenticated, local attacker to access a static secret key used to store both local data and credentials for accessing remote systems. This vulnerability is due to a static key value stored in the application used to encrypt application data and remote credentials. An attacker could exploit this vulnerability by gaining local access to the server Cisco Industrial Network Director is installed on. A successful exploit could allow the attacker to decrypt data allowing the attacker to access remote systems monitored by Cisco Industrial Network Director.
15 CVE-2023-1269 798 2023-03-08 2023-03-14
0.0
None ??? ??? ??? ??? ??? ???
Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
16 CVE-2023-0808 798 2023-02-13 2023-02-23
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability.
17 CVE-2023-0391 798 2023-03-21 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
MGT-COMMERCE CloudPanel ships with a static SSL certificate to encrypt communications to the administrative interface, shared across every installation of CloudPanel. This behavior was observed in version 2.2.0. There has been no indication from the vendor this has been addressed in version 2.2.1.
18 CVE-2023-0345 798 2023-03-13 2023-03-16
0.0
None ??? ??? ??? ??? ??? ???
The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user.
19 CVE-2022-48113 798 2023-02-02 2023-02-10
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.
20 CVE-2022-47618 798 2023-01-03 2023-01-10
0.0
None ??? ??? ??? ??? ??? ???
Merit LILIN AH55B04 & AH55B08 DVR firm has hard-coded administrator credentials. An unauthenticated remote attacker can use these credentials to log in administrator page, to manipulate system or disrupt service.
21 CVE-2022-47209 798 2022-12-16 2022-12-27
0.0
None ??? ??? ??? ??? ??? ???
A support user exists on the device and appears to be a backdoor for Technical Support staff. The default password for this account is “support” and cannot be changed by a user via any normally accessible means.
22 CVE-2022-46637 798 2023-02-21 2023-03-02
0.0
None ??? ??? ??? ??? ??? ???
Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services.
23 CVE-2022-46411 798 2022-12-04 2022-12-06
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges.
24 CVE-2022-45766 798 2023-02-10 2023-02-17
0.0
None ??? ??? ??? ??? ??? ???
Hardcoded credentials in Global Facilities Management Software (GFMS) Version 3 software distributed by Key Systems Management permits remote attackers to impact availability, confidentiality, accessibility and dependability of electronic key boxes.
25 CVE-2022-45444 798 2023-01-18 2023-01-26
0.0
None ??? ??? ??? ??? ??? ???
Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote attacker to login to the database with unrestricted access.
26 CVE-2022-45425 798 2022-12-27 2023-01-05
0.0
None ??? ??? ??? ??? ??? ???
Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.
27 CVE-2022-44097 798 2022-11-30 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
28 CVE-2022-44096 798 2022-11-30 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
29 CVE-2022-42980 798 2022-10-17 2022-10-20
0.0
None ??? ??? ??? ??? ??? ???
go-admin (aka GO Admin) 2.0.12 uses the string go-admin as a production JWT key.
30 CVE-2022-42973 798 2023-02-01 2023-02-08
0.0
None ??? ??? ??? ??? ??? ???
A CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause local privilege escalation when local attacker connects to the database. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)
31 CVE-2022-42176 798 2022-10-20 2022-11-04
0.0
None ??? ??? ??? ??? ??? ???
In PCTechSoft PCSecure V5.0.8.xw, use of Hard-coded Credentials in configuration files leads to admin panel access.
32 CVE-2022-41540 798 +Info 2022-10-18 2022-10-20
0.0
None ??? ??? ??? ??? ??? ???
The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.
33 CVE-2022-41157 798 Exec Code +Info 2022-11-25 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
A specific file on the sERP server if Kyungrinara(ERP solution) has a fixed password with the SYSTEM authority. This vulnerability could allow attackers to leak or steal sensitive information or execute malicious commands.
34 CVE-2022-40602 798 2022-11-22 2022-11-26
0.0
None ??? ??? ??? ??? ??? ???
A flaw in the Zyxel LTE3301-M209 firmware verisons prior to V1.00(ABLG.6)C0 could allow a remote attacker to access the device using an improper pre-configured password if the remote administration feature has been enabled by an authenticated administrator.
35 CVE-2022-40263 798 2022-11-04 2022-11-07
0.0
None ??? ??? ??? ??? ??? ???
BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.
36 CVE-2022-40259 798 2022-12-05 2023-02-23
0.0
None ??? ??? ??? ??? ??? ???
MegaRAC Default Credentials Vulnerability
37 CVE-2022-40242 798 2022-12-05 2023-02-28
0.0
None ??? ??? ??? ??? ??? ???
MegaRAC Default Credentials Vulnerability
38 CVE-2022-40111 798 2022-09-06 2022-09-09
0.0
None ??? ??? ??? ??? ??? ???
In TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 in the shadow.sample file, root is hardcoded in the firmware.
39 CVE-2022-39273 798 2022-10-06 2022-12-09
0.0
None ??? ??? ??? ??? ??? ???
FlyteAdmin is the control plane for the data processing platform Flyte. Users who enable the default Flyte’s authorization server without changing the default clientid hashes will be exposed to the public internet. In an effort to make enabling authentication easier for Flyte administrators, the default configuration for Flyte Admin allows access for Flyte Propeller even after turning on authentication via a hardcoded hashed password. This password is also set on the default Flyte Propeller configmap in the various Flyte Helm charts. Users who enable auth but do not override this setting in Flyte Admin’s configuration may unbeknownst to them be allowing public traffic in by way of this default password with attackers effectively impersonating propeller. This only applies to users who have not specified the ExternalAuthorizationServer setting. Usage of an external auth server automatically turns off this default configuration and are not susceptible to this vulnerability. This issue has been addressed in version 1.1.44. Users should manually set the staticClients in the selfAuthServer section of their configuration if they intend to rely on Admin’s internal auth server. Again, users who use an external auth server are automatically protected from this vulnerability.
40 CVE-2022-39185 798 2023-01-12 2023-01-20
0.0
None ??? ??? ??? ??? ??? ???
EXFO - BV-10 Performance Endpoint Unit Undocumented privileged user. Unit has an undocumented hard-coded privileged user.
41 CVE-2022-38823 798 2022-09-16 2022-09-17
0.0
None ??? ??? ??? ??? ??? ???
In TOTOLINK T6 V4.1.5cu.709_B20210518, there is a hard coded password for root in /etc/shadow.sample.
42 CVE-2022-38557 798 2022-08-28 2022-09-01
0.0
None ??? ??? ??? ??? ??? ???
D-Link DIR845L v1.00-v1.03 contains a Static Default Credential vulnerability in /etc/init0.d/S80telnetd.sh.
43 CVE-2022-38556 798 2022-08-28 2022-09-01
0.0
None ??? ??? ??? ??? ??? ???
Trendnet TEW733GR v1.03B01 contains a Static Default Credential vulnerability in /etc/init0.d/S80telnetd.sh.
44 CVE-2022-38420 798 2022-10-14 2022-10-20
0.0
None ??? ??? ??? ??? ??? ???
Adobe ColdFusion versions Update 14 (and earlier) and Update 4 (and earlier) are affected by a Use of Hard-coded Credentials vulnerability that could result in application denial-of-service by gaining access to start/stop arbitrary services. Exploitation of this issue does not require user interaction.
45 CVE-2022-38394 798 Exec Code 2022-09-08 2022-09-13
0.0
None ??? ??? ??? ??? ??? ???
Use of hard-coded credentials for the telnet server of CentreCOM AR260S V2 firmware versions prior to Ver.3.3.7 allows a remote unauthenticated attacker to execute an arbitrary OS command.
46 CVE-2022-38337 798 DoS 2022-12-06 2023-02-03
0.0
None ??? ??? ??? ??? ??? ???
When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
47 CVE-2022-38117 798 2022-10-24 2022-10-25
0.0
None ??? ??? ??? ??? ??? ???
Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it.
48 CVE-2022-38116 798 2022-08-30 2022-09-06
0.0
None ??? ??? ??? ??? ??? ???
Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service.
49 CVE-2022-38069 798 +Priv 2022-09-13 2022-09-14
0.0
None ??? ??? ??? ??? ??? ???
Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parameters
50 CVE-2022-37857 798 2022-09-08 2022-09-14
0.0
None ??? ??? ??? ??? ??? ???
bilde2910 Hauk v1.6.1 requires a hardcoded password which by default is blank. This hardcoded password is hashed but stored within the config.php file server-side as well as in clear-text on the android client device by default.
Total number of vulnerabilities : 948   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.