ID CVE-2001-1339
Summary Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Vulnerable Configurations
  • cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:*
    cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 09-02-2024 - 03:15)
Impact:
Exploitability:
CWE CWE-307
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 2771
bugtraq
  • 20010524 IPC@Chip Security
  • 20010602 IPC@Chip - Fixes
cert-vn VU#198979
xf ipcchip-telnet-bruteforce-passwords(6605)
Last major update 09-02-2024 - 03:15
Published 24-05-2001 - 04:00
Last modified 09-02-2024 - 03:15
Back to Top