mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
67 lines
2.3 KiB
JSON
67 lines
2.3 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-28368",
|
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "TP-Link Corporation Limited",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "T2600G-28SQ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227'"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Use of weak credentials"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware",
|
|
"refsource": "MISC",
|
|
"name": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"
|
|
},
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN62420378/",
|
|
"refsource": "MISC",
|
|
"name": "https://jvn.jp/en/jp/JVN62420378/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "TP-Link L2 switch T2600G-28SQ firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained."
|
|
}
|
|
]
|
|
}
|
|
} |