CVE-2023-28368
Published Apr 11, 2023
Last updated 2 years ago
Overview
- Description
- TP-Link L2 switch T2600G-28SQ firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:t2600g-28sq_firmware:20190530:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54026FF9-55C5-4501-B05C-0D6C8C6BC108" }, { "criteria": "cpe:2.3:o:tp-link:t2600g-28sq_firmware:20200304:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D57EA613-F481-46AC-80C4-F851EC1C18CF" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:t2600g-28sq:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C69D673B-718C-47FB-AE3F-E503EFE4DBBD" } ], "operator": "OR" } ], "operator": "AND" } ]