Lucene search

K
cvelistTwcertCVELIST:CVE-2022-32967
HistoryNov 29, 2022 - 3:30 a.m.

CVE-2022-32967 Realtek RTL8111EP-CG/RTL8111FP-CG - Use of Hard-coded Credentials

2022-11-2903:30:27
CWE-798
twcert
www.cve.org
1
realtek rtl8111ep-cg
rtl8111fp-cg
hard-coded credentials
cve-2022-32967
vulnerability
unauthenticated attacker

CVSS3

2.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

AI Score

3.9

Confidence

High

EPSS

0.001

Percentile

21.7%

RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.

CNA Affected

[
  {
    "vendor": "Realtek",
    "product": "RTL8111EP-CG",
    "versions": [
      {
        "version": "unspecified",
        "lessThanOrEqual": "3.0.0.2019090",
        "status": "affected",
        "versionType": "custom"
      },
      {
        "version": "5.0.10",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Realtek",
    "product": "RTL8111FP-CG",
    "versions": [
      {
        "version": "unspecified",
        "lessThanOrEqual": "3.0.0.2019090",
        "status": "affected",
        "versionType": "custom"
      },
      {
        "version": "5.0.10",
        "status": "affected"
      }
    ]
  }
]

CVSS3

2.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

AI Score

3.9

Confidence

High

EPSS

0.001

Percentile

21.7%

Related for CVELIST:CVE-2022-32967