8.4

CVE-2022-25219

Exploit
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhicommK2 Firmware Version <= 22.5.9.163
   PhicommK2 Version-
PhicommK3 Firmware Version <= 21.5.37.246
   PhicommK3 Version-
PhicommK3c Firmware Version <= 32.1.15.93
   PhicommK3c Version-
PhicommK2g Firmware Version <= 22.6.3.20
   PhicommK2g Version-
PhicommK2p Firmware Version <= 20.4.1.7
   PhicommK2p Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.355
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.4 2.5 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
Es wurden noch keine Informationen zu CWE veröffentlicht.