{"vuid":"VU#143740","idnumber":"143740","name":"Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials","keywords":["netgear","gs105pe","prosafe","cwe-798","hard-coded"],"overview":"Netgear GS105PE Prosafe Plus Switch firmware version 1.2.0.5 contains hard-coded credentials. (CWE-798)","clean_desc":"Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials that can be used for authenticating to the web server running on the device. The username is ntgruser and the password is debugpassword. Once authenticated, the web server provides access to: produce_burn.cgi : Modify the serial number and MAC address of the product\nregister_debug.cgi : Allow the user to manually set memory to a certain value and extract that value from it\nbootcode_update.cgi : Allow the user to upload new firmware. Note: The previous version of this note incorrectly identified the Netgear GS108PE as the affected model.","impact":"A remote unauthenticated attacker may be able to login into the device and execute arbitrary code.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Marc Olivier Chouinard for reporting this vulnerability.","author":"This document was written by Chris King.","public":["h","t","t","p",":","/","/","w","w","w",".","n","e","t","g","e","a","r",".","c","o","m","/","b","u","s","i","n","e","s","s","/","p","r","o","d","u","c","t","s","/","s","w","i","t","c","h","e","s","/","u","n","m","a","n","a","g","e","d","-","p","l","u","s","/","G","S","1","0","5","P","E",".","a","s","p","x"],"cveids":["CVE-2014-2969"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-05-14T18:59:56Z","publicdate":"2014-07-03T00:00:00Z","datefirstpublished":"2014-07-03T16:08:26Z","dateupdated":"2014-07-08T14:04:41Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:A/AC:L/Au:N/C:C/I:C/A:N","cvss_temporalscore":"6.3","cvss_environmentalscore":"1.66608092745952","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}