2.1

CVE-2022-32967

RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.

Data is provided by the National Vulnerability Database (NVD)
RealtekRtl8111ep-cg Firmware Version <= 3.0.0.2019090
   RealtekRtl8111ep-cg Version-
RealtekRtl8111ep-cg Firmware Version5.0.10
   RealtekRtl8111ep-cg Version-
RealtekRtl8111fp-cg Firmware Version <= 3.0.0.2019090
   RealtekRtl8111fp-cg Version-
RealtekRtl8111fp-cg Firmware Version5.0.10
   RealtekRtl8111fp-cg Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.235
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
twcert@cert.org.tw 2.1 0.7 1.4
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.