cve/2021/CVE-2021-34601.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-34601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34601)
![](https://img.shields.io/static/v1?label=Product&message=CC612&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CC613&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ICC15xx&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ICC16xx&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.11.x%3C%205.11.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-259%20Use%20of%20Hard-coded%20Password&color=brighgreen)
### Description
In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI.
### POC
#### Reference
- https://cert.vde.com/en/advisories/VDE-2021-047
#### Github
No PoCs found on GitHub currently.