A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03 | Mitigation Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03 - Mitigation, Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.6 |
Information
Published : 2022-04-20 16:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27179
Mitre link : CVE-2022-27179
CVE.ORG link : CVE-2022-27179
JSON object : View
Products Affected
redlion
- da50n
- da50n_firmware
CWE
CWE-522
Insufficiently Protected Credentials