CVE-2019-11326
Severity CVSS v4.0:
Pending analysis
Type:
CWE-425
Direct Request ('Forced Browsing')
Publication date:
20/09/2019
Last modified:
24/08/2020
Description
An issue was discovered on Topcon Positioning Net-G5 GNSS Receiver devices with firmware 5.2.2. The web interface of the product is protected by a login. A guest is allowed to login. Once logged in as a guest, an attacker can browse a URL to read the password of the administrative user. The same procedure allows a regular user to gain administrative privileges. The guest login is possible in the default configuration.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:topcon:net-g5_firmware:5.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:h:topcon:net-g5:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



