CVE-2022-21800

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-034-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:airspan:mimosa_management_platform:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:airspan:c6x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airspan:c6x:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:airspan:c5x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airspan:c5x:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:airspan:c5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airspan:c5c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:airspan:a5x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airspan:a5x:-:*:*:*:*:*:*:*

History

24 Jul 2023, 13:50

Type Values Removed Values Added
CWE CWE-327 CWE-326

Information

Published : 2022-02-18 18:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-21800

Mitre link : CVE-2022-21800

CVE.ORG link : CVE-2022-21800


JSON object : View

Products Affected

airspan

  • c5x
  • c6x_firmware
  • a5x_firmware
  • a5x
  • c5c
  • c5c_firmware
  • mimosa_management_platform
  • c5x_firmware
  • c6x
CWE
CWE-326

Inadequate Encryption Strength

CWE-327

Use of a Broken or Risky Cryptographic Algorithm