{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8455","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2024-09-05T02:53:08.080Z","datePublished":"2024-09-30T07:24:49.379Z","dateUpdated":"2024-09-30T16:54:36.168Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"GS-4210-24PL4C hardware 2.0","vendor":"PLANET Technology","versions":[{"lessThan":"2.305b240719","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"GS-4210-24P2S hardware 3.0","vendor":"PLANET Technology","versions":[{"lessThan":"3.305b240802","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"IGS-5225-4UP1T2S hardware 1.0","vendor":"PLANET Technology","versions":[{"status":"affected","version":"0"}]}],"datePublic":"2024-09-30T07:24:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords."}],"value":"The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords."}],"impacts":[{"capecId":"CAPEC-97","descriptions":[{"lang":"en","value":"CAPEC-97 Cryptanalysis"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-261","description":"CWE-261 Weak Encoding for Password","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2024-09-30T07:25:13.087Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-8059-bde5f-1.html"},{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/en/cp-139-8060-f3955-2.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.<br>Update firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later.<br>IGS-5225-4UP1T2S hardware 1.0 has reached End of Life (EOL). Replacement is recommended.<br>"}],"value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.\nUpdate firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later.\nIGS-5225-4UP1T2S hardware 1.0 has reached End of Life (EOL). Replacement is recommended."}],"source":{"advisory":"TVN-202409011","discovery":"EXTERNAL"},"title":"PLANET Technology switch devices - Swctrl service exchanges weakly encoded passwords","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"planet_technology_corp","product":"gs-4210-24pl4c_hardware_2.0","cpes":["cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_2.0:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.305b240719","versionType":"custom"}]},{"vendor":"planet_technology_corp","product":"gs-4210-24pl4c_hardware_3.0","cpes":["cpe:2.3:a:planet_technology_corp:gs-4210-24pl4c_hardware_3.0:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.305b240802","versionType":"custom"}]},{"vendor":"planet_technology_corp","product":"igs-5225-4up1t2s_hardware_1.0","cpes":["cpe:2.3:a:planet_technology_corp:igs-5225-4up1t2s_hardware_1.0:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-30T16:51:56.909491Z","id":"CVE-2024-8455","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-30T16:54:36.168Z"}}]}}