diff --git a/network/cves/2023/CVE-2023-38433.yaml b/network/cves/2023/CVE-2023-38433.yaml index 45d684495f..dae8a53129 100644 --- a/network/cves/2023/CVE-2023-38433.yaml +++ b/network/cves/2023/CVE-2023-38433.yaml @@ -4,7 +4,7 @@ info: author: AdnaneKhan severity: high description: | - Fujitsu Real-time Video Transmission Gear uses hard-coded credentials. The credentials cannot be changed by the end-user and provide administrative access to the devices. + Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices. reference: - https://www.praetorian.com/blog/fujitsu-ip-series-hard-coded-credentials/ - https://nvd.nist.gov/vuln/detail/CVE-2023-38433