ghsa-f3g2-f685-r373
Vulnerability from github
Published
2022-08-30 00:00
Modified
2022-09-03 00:00
Severity
Details

Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-36558"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-798"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-08-29T23:15:00Z",
    "severity": "CRITICAL"
  },
  "details": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.",
  "id": "GHSA-f3g2-f685-r373",
  "modified": "2022-09-03T00:00:17Z",
  "published": "2022-08-30T00:00:24Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36558"
    },
    {
      "type": "WEB",
      "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54"
    },
    {
      "type": "WEB",
      "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...