TP-Link L2 switch T2600G-28SQ firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN62420378/ | Third Party Advisory |
https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware | Product |
https://jvn.jp/en/jp/JVN62420378/ | Third Party Advisory |
https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1391 |
Information
Published : 2023-04-11 09:15
Updated : 2025-02-10 21:15
NVD link : CVE-2023-28368
Mitre link : CVE-2023-28368
CVE.ORG link : CVE-2023-28368
JSON object : View
Products Affected
tp-link
- t2600g-28sq
- t2600g-28sq_firmware
CWE