The Cisco Linksys WVC54GC wireless video camera before firmware 1.25 sends cleartext configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by sniffing the network.
References
Link | Resource |
---|---|
http://secunia.com/advisories/33032 | Broken Link |
http://www.kb.cert.org/vuls/id/528993 | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/MAPG-7HJKSA | Third Party Advisory US Government Resource |
http://www.linksys.com/servlet/Satellite?blobcol=urldata&blobheadername1=Content-Type&blobheadername2=Content-Disposition&blobheadervalue1=text%2Fplain&blobheadervalue2=inline%3B+filename%3DWVC54GC-V1.0_non-RoHS-v1.25_fw_ver.txt&blobkey=id&blobtable=MungoBlobs&blobwhere=1193776031728&ssbinary=true&lid=8104724130B17 | Product |
http://www.securityfocus.com/bid/32666 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2008-12-09 00:30
Updated : 2024-01-25 20:50
NVD link : CVE-2008-4390
Mitre link : CVE-2008-4390
CVE.ORG link : CVE-2008-4390
JSON object : View
Products Affected
cisco
- linksys_wvc54gc_firmware
- linksys_wvc54gc
CWE
CWE-319
Cleartext Transmission of Sensitive Information