Petwant.Petalk.Telnet.Default.Credentials.Security.Bypass

description-logoDescription

This indicates an attack attempt to exploit a Security Bypass vulnerability in Petwant or Petalk AI.
The vulnerability is due to hard coded default credentials inside the vulnerable application. A remote attacker can exploit this to authenticate with the application and gain administrator level privileges on the target system.

affected-products-logoAffected Products

Petwant PF-103 firmware 4.3.2.50 and Petalk AI 3.2.2.30

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-01-16 15.759 Default_action:pass:drop
2019-12-31 15.751