CVE-2022-1666

EUVD-2022-24952
The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
icscertCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
Affected Products (NVD)
VendorProductVersion
secheronsepcos_control_and_protection_relay_firmware
1.23.0 ≤
𝑥
< 1.23.21
secheronsepcos_control_and_protection_relay_firmware
1.24.0 ≤
𝑥
< 1.24.8
secheronsepcos_control_and_protection_relay_firmware
1.25.0 ≤
𝑥
< 1.25.3
𝑥
= Vulnerable software versions