CWE = Common Weakness Enumeration
CVE = Common Vulnerabilities and Exposures
- CWE 347 - "An attacker could gain access to sensitive data and possibly execute unauthorized code"
- CWE-1283 - "An attacker can read memory, application data"
- CWE-912 - "can increase the software's attack surface and expose additional weaknesses beyond what is already exposed by the intended functionality. Even if it is not easily accessible, the hidden functionality could be useful for attacks that modify the control flow of the application."
- CWE-424 - "The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources." ... "Bypass Protection Mechanism; Gain Privileges or Assume Identity"
- CWE-24 - "Read Files or Directories; Modify Files or Directories"
- CWE-250 - "Gain Privileges or Assume Identity; Execute Unauthorized Code or Commands; Read Application Data; DoS: Crash, Exit, or Restart"
- CWE-290 - "Bypass Protection Mechanism; Gain Privileges or Assume Identity"
- CWE-266 - "Gain Privileges or Assume Identity"
- CWE-346 - "Gain Privileges or Assume Identity; Varies by Context"
A list of multiple weaknesses that allow you to gain access, gain elevated rights, read memory, read/change application data, execute unauthorized code, and change where data is sent/stored. This doesn't read like a "bug", this reads more like a "feature." Throw in the ability to crash/restart the system, I damn hacker could do what they wanted, remove their tracks, and restart to make it like they were never there.
....and they were sharing logins, using no/weak passwords, and not 100% air gapped, good effing lord.