CVE-2022-26671

Taiwan Secom Dr.ID Access Control system’s login page has a hard-coded credential in the source code. An unauthenticated remote attacker can use the hard-coded credential to acquire partial system information and modify system setting to cause partial disrupt of service.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:secom:dr.id_access_control:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:secom:dr.id_attendance_system:3.4.0.0.3.11:*:*:*:*:*:*:*

History

14 Apr 2022, 19:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 7.3
References (MISC) https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html - (MISC) https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html - Third Party Advisory
CPE cpe:2.3:a:secom:dr.id_access_control:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:secom:dr.id_attendance_system:3.4.0.0.3.11:*:*:*:*:*:*:*
CWE CWE-798

07 Apr 2022, 19:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-07 19:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-26671

Mitre link : CVE-2022-26671

CVE.ORG link : CVE-2022-26671


JSON object : View

Products Affected

secom

  • dr.id_access_control
  • dr.id_attendance_system
CWE
CWE-798

Use of Hard-coded Credentials