THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-33625

CyberPower PowerPanel business Use of Hard-coded Password

Assignericscert
Reserved2024-04-29
Published2024-05-15
Updated2024-06-04

Description

CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication.



CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-259

Product status

Default status
unaffected

Any version before 4.9.0
affected

Credits

Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA. finder

References

https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01

https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads

cve.org CVE-2024-33625

nvd.nist.gov CVE-2024-33625

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-33625
© Copyright 2024 THREATINT. Made in Cyprus with +