CVE-2020-2499
24.12.2020, 02:15
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.Enginsight
Vendor | Product | Version |
---|---|---|
qnap | qes | 𝑥 < 2.1.1 |
qnap | qes | 2.1.1 |
qnap | qes | 2.1.1:build_20200211 |
qnap | qes | 2.1.1:build_20200303 |
qnap | qes | 2.1.1:build_20200319 |
qnap | qes | 2.1.1:build_20200424 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-259 - Use of Hard-coded PasswordThe software contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
- CWE-798 - Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.