CVE Vulnerabilities

CVE-2022-1668

Weak Password Requirements

Published: Jun 24, 2022 | Modified: Jul 05, 2022
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Sepcos_control_and_protection_relay_firmware Secheron 1.23.0 (including) 1.23.21 (excluding)
Sepcos_control_and_protection_relay_firmware Secheron 1.24.0 (including) 1.24.8 (excluding)
Sepcos_control_and_protection_relay_firmware Secheron 1.25.0 (including) 1.25.3 (excluding)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References