CVE-2022-25213

Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
PHYSICAL
LOW
NONE
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
tenableCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
VendorProductVersion
phicommk2_firmware
𝑥
≤ 22.5.9.163
phicommk3_firmware
𝑥
≤ 21.5.37.246
phicommk3c_firmware
𝑥
≤ 32.1.15.93
phicommk2g_firmware
𝑥
≤ 22.6.3.20
phicommk2p_firmware
𝑥
≤ 20.4.1.7
𝑥
= Vulnerable software versions