CVE Vulnerabilities

CVE-2022-1666

Insufficiently Protected Credentials

Published: Jun 24, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
Sepcos_control_and_protection_relay_firmwareSecheron1.23.0 (including)1.23.21 (excluding)
Sepcos_control_and_protection_relay_firmwareSecheron1.24.0 (including)1.24.8 (excluding)
Sepcos_control_and_protection_relay_firmwareSecheron1.25.0 (including)1.25.3 (excluding)

Potential Mitigations

References