CVE-2022-28376

Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:verizon:lvskihp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:verizon:lvskihp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:57

Type Values Removed Values Added
References () https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md - Exploit, Third Party Advisory () https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md - Exploit, Third Party Advisory
References () https://www.reddit.com/r/verizon/comments/sstq4c/5g_home_internet_dropping_out/hx3ir0s/ - Third Party Advisory () https://www.reddit.com/r/verizon/comments/sstq4c/5g_home_internet_dropping_out/hx3ir0s/ - Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-668 CWE-287

Information

Published : 2022-04-03 04:15

Updated : 2024-11-21 06:57


NVD link : CVE-2022-28376

Mitre link : CVE-2022-28376

CVE.ORG link : CVE-2022-28376


JSON object : View

Products Affected

verizon

  • lvskihp_firmware
  • lvskihp
CWE
CWE-287

Improper Authentication