Description
KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/robertguetzkow/ets5-password-recovery |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:03:08.493Z
Reserved: 2021-11-09T00:00:00.000Z
Link: CVE-2021-43575
No data.
Status : Modified
Published: 2021-11-09T23:15:08.933
Modified: 2024-11-21T06:29:28.457
Link: CVE-2021-43575
No data.
OpenCVE Enrichment
No data.
Weaknesses