CVE-2022-36159

Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:contec:fxa3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:contec:fxa3000:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:contec:fxa3020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:contec:fxa3020:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:contec:fxa3200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:contec:fxa3200:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:contec:fxa2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:contec:fxa2000:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-26 11:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-36159

Mitre link : CVE-2022-36159

CVE.ORG link : CVE-2022-36159


JSON object : View

Products Affected

contec

  • fxa3200
  • fxa3020_firmware
  • fxa2000_firmware
  • fxa3200_firmware
  • fxa2000
  • fxa3020
  • fxa3000_firmware
  • fxa3000
CWE
CWE-798

Use of Hard-coded Credentials