7.5
CVE-2022-28371
- EPSS 0.21%
- Veröffentlicht 14.07.2022 13:15:08
- Zuletzt bearbeitet 21.11.2024 06:57:14
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints rely on a static certificate for access control. This certificate is embedded in the firmware, and is identical across the fleet of devices. An attacker need only download this firmware and extract the private components of these certificates (from /etc/lighttpd.d/ca.pem and /etc/lighttpd.d/server.pem) to gain access. (The firmware download location is shown in a device's upgrade logs.)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Verizon ≫ Lvskihp Indoorunit Firmware Version3.4.66.162
Verizon ≫ Lvskihp Outdoorunit Firmware Version3.33.101.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.21% | 0.433 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.