CVE-2022-1666

The default password for the web applications root user (the vendors private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
icscertCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
VendorProductVersion
secheronsepcos_control_and_protection_relay_firmware
1.23.0 ≤
𝑥
< 1.23.21
secheronsepcos_control_and_protection_relay_firmware
1.24.0 ≤
𝑥
< 1.24.8
secheronsepcos_control_and_protection_relay_firmware
1.25.0 ≤
𝑥
< 1.25.3
𝑥
= Vulnerable software versions