Lucene search

K
cve[email protected]CVE-2022-25989
HistoryMay 05, 2022 - 6:15 p.m.

CVE-2022-25989

2022-05-0518:15:09
CWE-290
web.nvd.nist.gov
90
2
cve-2022-25989
authentication bypass
anker eufy homebase 2
libxm_av.so
dhcp poison

5.8 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.5%

An authentication bypass vulnerability exists in the libxm_av.so getpeermac() functionality of Anker Eufy Homebase 2 2.1.8.5h. A specially-crafted DHCP packet can lead to authentication bypass. An attacker can DHCP poison to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
ankereufy_homebase_2Range2.1.8.5h
VendorProductVersionCPE
ankereufy_homebase_2*cpe:2.3:h:anker:eufy_homebase_2:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Eufy Homebase 2",
    "vendor": "Anker",
    "versions": [
      {
        "status": "affected",
        "version": "2.1.8.5h"
      }
    ]
  }
]

Social References

More

5.8 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.5%

Related for CVE-2022-25989