Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
2020-11-24T20:15:11.853
2024-11-21T05:22:35.257
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | barco | wepresent_wipg-1600w_firmware | 2.4.1.19 | Yes |
Operating System | barco | wepresent_wipg-1600w_firmware | 2.5.0.24 | Yes |
Operating System | barco | wepresent_wipg-1600w_firmware | 2.5.0.25 | Yes |
Operating System | barco | wepresent_wipg-1600w_firmware | 2.5.1.8 | Yes |
Hardware | barco | wepresent_wipg-1600w | - | No |