7.5
CVE-2022-40621
- EPSS 0.31%
- Veröffentlicht 13.09.2022 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:21:43
- Quelle cve@rapid7.com
- CVE-Watchlists
- Unerledigt
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wavlink ≫ Wn531g3 Firmware Version <= m31g3.v5030.200325
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.31% | 0.535 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).