CVE-2022-2107

The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. This may allow an attacker to send SMS commands directly to the GPS tracker as if they were coming from the GPS owner’s mobile number.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*

History

27 Jul 2022, 21:46

Type Values Removed Values Added
References (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

20 Jul 2022, 17:28

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-20 16:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-2107

Mitre link : CVE-2022-2107

CVE.ORG link : CVE-2022-2107


JSON object : View

Products Affected

micodus

  • mv720_firmware
  • mv720
CWE
CWE-798

Use of Hard-coded Credentials