CVE-2022-35513

The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.
Configurations

Configuration 1 (hide)

cpe:2.3:a:blink1:blink1control2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:11

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/p1ckzi/CVE-2022-35513 - Exploit, Third Party Advisory () https://github.com/p1ckzi/CVE-2022-35513 - Exploit, Third Party Advisory
References () https://github.com/todbot/Blink1Control2/releases - Release Notes, Third Party Advisory () https://github.com/todbot/Blink1Control2/releases - Release Notes, Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-326 CWE-922
CWE-327

Information

Published : 2022-09-07 14:15

Updated : 2024-11-21 07:11


NVD link : CVE-2022-35513

Mitre link : CVE-2022-35513

CVE.ORG link : CVE-2022-35513


JSON object : View

Products Affected

blink1

  • blink1control2
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-922

Insecure Storage of Sensitive Information