CVE-2022-2103

An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 Mitigation Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:secheron:sepcos_control_and_protection_relay:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
CVSS v2 : 6.4
v3 : 9.1
v2 : 6.4
v3 : 9.8
References () https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 - Mitigation, Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 - Mitigation, Third Party Advisory, US Government Resource

Information

Published : 2022-06-24 15:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2103

Mitre link : CVE-2022-2103

CVE.ORG link : CVE-2022-2103


JSON object : View

Products Affected

secheron

  • sepcos_control_and_protection_relay_firmware
  • sepcos_control_and_protection_relay
CWE
CWE-284

Improper Access Control

CWE-522

Insufficiently Protected Credentials