Security Alerts blog

Geovision Fingerprint Card Scanners Contain Critical Bugs and a Backdoor

Over 2,500 vulnerable devices from Geovision have a backdoor due to a weak default password “admin”. This can lead to these devices being remotely compromised. As a best practice, ensure all root passwords are complex and are not set to the default value.

Other flaws include allowing unauthenticated attackers to access system logs, using hardcoded shared private keys for SSH and a buffer overflow which could allow attackers to execute code. All vulnerabilities except the buffer overflow were patched in recent updates.

These have likely arisen due to a lack of security in mind during the development of the software used which is not uncommon for IoT devices.

Source: Thehackernews

Risk Crew

Share
Published by
Risk Crew
Tags: June2020

Recent Posts

AI Governance by Design

Artificial intelligence is transforming how organisations operate, innovate and deliver value. As AI becomes woven…

7 days ago

ISO 42001: Key Insights You Need to Know

Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…

9 months ago

ISO 27001 Requirements | Your Roadmap to Compliance

Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…

9 months ago