Description
Beward Intercom 2.3.1 contains a credentials disclosure vulnerability that allows local attackers to access plain-text authentication credentials stored in an unencrypted database file. Attackers can read the BEWARD.INTERCOM.FDB file to extract usernames and passwords, enabling unauthorized access to IP cameras and door stations.
Problem types
Plaintext Storage of a Password
Product status
2.3.0
2.2.11
2.2.10.5
2.2.9
2.2.8.9
2.2.7.4
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5505.php
www.exploit-db.com/exploits/46267 (ExploitDB-46267)
www.beward.net (Beward Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5505.php (Zero Science Lab Disclosure (ZSL-2019-5505))
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.