CVE Vulnerabilities

CVE-2022-1668

Weak Password Requirements

Published: Jun 24, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.

Weakness

The product does not require that users should have strong passwords.

Affected Software

NameVendorStart VersionEnd Version
Sepcos_control_and_protection_relay_firmwareSecheron1.23.0 (including)1.23.21 (excluding)
Sepcos_control_and_protection_relay_firmwareSecheron1.24.0 (including)1.24.8 (excluding)
Sepcos_control_and_protection_relay_firmwareSecheron1.25.0 (including)1.25.3 (excluding)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References