CVE-2022-1666
24.06.2022, 15:15
The default password for the web applications root user (the vendors private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.Enginsight
Vendor | Product | Version |
---|---|---|
secheron | sepcos_control_and_protection_relay_firmware | 1.23.0 ≤ 𝑥 < 1.23.21 |
secheron | sepcos_control_and_protection_relay_firmware | 1.24.0 ≤ 𝑥 < 1.24.8 |
secheron | sepcos_control_and_protection_relay_firmware | 1.25.0 ≤ 𝑥 < 1.25.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration