Attack vectors |
In this vulnerability we can notice several issues. Default passwords, weak passwords that are easy to guess or brute force, The password reset vulnerabilities and the different levels of authorization. |
|
Security Weakness |
This vulnerability type can occur in several ways. First of all, the lowest hanging fruit would be insecure passwords but that’s by far the only issue. Password reset mechanisms may contain issues that are exploitable to gain access to internal interfaces. When the attacker does get access to a system, they should be stopped by not only allowing accounts access to settings they should have access to and by disabling any admin accounts. |
|
Technical impact |
Besides the obvious device takeover, we need to consider that data might get corrupted or lost or that we can even get locked out of our own devices. |
|
Business impact |
Besides the harm to the customer, serious harm to the image of a brand can occur. |
|