Lucene search

K
nvd[email protected]NVD:CVE-2022-32967
HistoryNov 29, 2022 - 4:15 a.m.

CVE-2022-32967

2022-11-2904:15:10
CWE-798
web.nvd.nist.gov
2
rtl8111ep-cg
rtl8111fp-cg
dash function
default password
vulnerability

CVSS3

2.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

21.7%

RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.

Affected configurations

Nvd
Node
realtekrtl8111ep-cg_firmwareRange3.0.0.2019090
OR
realtekrtl8111ep-cg_firmwareMatch5.0.10
AND
realtekrtl8111ep-cgMatch-
Node
realtekrtl8111fp-cg_firmwareRange3.0.0.2019090
OR
realtekrtl8111fp-cg_firmwareMatch5.0.10
AND
realtekrtl8111fp-cgMatch-
VendorProductVersionCPE
realtekrtl8111ep-cg_firmware*cpe:2.3:o:realtek:rtl8111ep-cg_firmware:*:*:*:*:*:*:*:*
realtekrtl8111ep-cg_firmware5.0.10cpe:2.3:o:realtek:rtl8111ep-cg_firmware:5.0.10:*:*:*:*:*:*:*
realtekrtl8111ep-cg-cpe:2.3:h:realtek:rtl8111ep-cg:-:*:*:*:*:*:*:*
realtekrtl8111fp-cg_firmware*cpe:2.3:o:realtek:rtl8111fp-cg_firmware:*:*:*:*:*:*:*:*
realtekrtl8111fp-cg_firmware5.0.10cpe:2.3:o:realtek:rtl8111fp-cg_firmware:5.0.10:*:*:*:*:*:*:*
realtekrtl8111fp-cg-cpe:2.3:h:realtek:rtl8111fp-cg:-:*:*:*:*:*:*:*

CVSS3

2.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

21.7%

Related for NVD:CVE-2022-32967