CVE-2022-36159
26.09.2022, 11:15
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.Enginsight
Vendor | Product | Version |
---|---|---|
contec | fxa3000_firmware | 𝑥 ≤ 1.13.00 |
contec | fxa3020_firmware | 𝑥 ≤ 1.13.00 |
contec | fxa3200_firmware | 𝑥 ≤ 1.13.00 |
contec | fxa2000_firmware | 𝑥 < 1.39.00 |
𝑥
= Vulnerable software versions
References