Lucene search

K
cvelistIcscertCVELIST:CVE-2022-1668
HistoryJun 24, 2022 - 3:00 p.m.

CVE-2022-1668 Secheron SEPCOS Control and Protection Relay

2022-06-2415:00:32
CWE-521
icscert
www.cve.org
3
cve-2022-1668
weak credentials
remote attackers
os superuser privileges
tcp port
ssh

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.003

Percentile

71.8%

Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.

CNA Affected

[
  {
    "product": "SEPCOS Control and Protection Relay firmware package",
    "vendor": "Secheron",
    "versions": [
      {
        "changes": [
          {
            "at": "1.24.8",
            "status": "unaffected"
          },
          {
            "at": "1.25.3",
            "status": "unaffected"
          }
        ],
        "lessThan": "1.23.21",
        "status": "affected",
        "version": "All versions",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.003

Percentile

71.8%

Related for CVELIST:CVE-2022-1668