Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2018-4017First vendor Publication2019-05-13
VendorCveLast vendor Modification2019-05-15

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score8.3Attack RangeAdjacent network
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score6.5AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An exploitable vulnerability exists in the Wi-Fi Access Point feature of the Roav A1 Dashcam running version RoavA1SWV1.9. A set of default credentials can potentially be used to connect to the device. An attacker can connect to the AP to trigger this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4017

CWE : Common Weakness Enumeration

%idName
100 %CWE-798Use of Hard-coded Credentials (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware1
Os1

Sources (Detail)

SourceUrl
MISC https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-05-15 21:19:34
  • Multiple Updates
2019-05-13 21:19:24
  • First insertion