![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106577 |
Category: | Web application abuses |
Title: | JUNG Smart Visu Server Multiple Vulnerabilities |
Summary: | JUNG Smart Visu Server is prone to multiple vulnerabilities. |
Description: | Summary: JUNG Smart Visu Server is prone to multiple vulnerabilities. Vulnerability Insight: JUNG Smart Visu Server is prone to multiple vulnerabilities: - Path Traversal Vulnerability: The Smart Visu Server runs with root privileges and is vulnerable to path traversal. This leads to full information disclosure of all files on the system. - Backdoor Accounts: Two undocumented operating system user accounts are present on the appliance. They can be used to gain access to the Smart Visu Server via SSH. - Group Address (GA) unlock without Password: As protection functionality, the KNX group address can be locked with a user-defined password. This password can be removed by using a single PUT request. An attacker can completely change the configuration of the connected devices (e.g. a light switch in the kitchen can be swapped with the air conditioner). Solution: Upgrade to firmware version 1.0.900 or newer. CVSS Score: 9.4 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |