Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45262 | There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials. |
Wed, 02 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Dragos
Published:
Updated: 2024-10-02T20:23:51.426Z
Reserved: 2023-08-18T19:31:53.417Z
Link: CVE-2023-40707
Updated: 2024-08-02T18:38:51.159Z
Status : Modified
Published: 2023-08-24T17:15:08.967
Modified: 2024-11-21T08:20:00.177
Link: CVE-2023-40707
No data.
OpenCVE Enrichment
No data.
EUVD