7.2

CVE-2022-25213

Exploit
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhicommK2 Firmware Version <= 22.5.9.163
   PhicommK2 Version-
PhicommK3 Firmware Version <= 21.5.37.246
   PhicommK3 Version-
PhicommK3c Firmware Version <= 32.1.15.93
   PhicommK3c Version-
PhicommK2g Firmware Version <= 22.6.3.20
   PhicommK2g Version-
PhicommK2p Firmware Version <= 20.4.1.7
   PhicommK2p Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.17
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.