Insufficiently protected credentials vulnerability in 'TEPRA' PRO SR5900P Ver.1.080 and earlier and 'TEPRA' PRO SR-R7900P Ver.1.030 and earlier allows an attacker on the adjacent network to obtain credentials for connecting to the Wi-Fi access point with the infrastructure mode.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN81479705/index.html | Third Party Advisory |
https://www.kingjim.co.jp/download/security/#sr01 | Patch Vendor Advisory |
https://jvn.jp/en/jp/JVN81479705/index.html | Third Party Advisory |
https://www.kingjim.co.jp/download/security/#sr01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
History
21 Nov 2024, 06:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN81479705/index.html - Third Party Advisory | |
References | () https://www.kingjim.co.jp/download/security/#sr01 - Patch, Vendor Advisory |
Information
Published : 2022-01-17 10:15
Updated : 2024-11-21 06:38
NVD link : CVE-2022-0184
Mitre link : CVE-2022-0184
CVE.ORG link : CVE-2022-0184
JSON object : View
Products Affected
kingjim
- spc10_firmware
- tepura_pro_sr5900p
- tepura_pro_sr-7900p_firmware
- spc10
- tepura_pro_sr-7900p
- tepura_pro_sr5900p_firmware
- sma3
CWE
CWE-522
Insufficiently Protected Credentials