Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
References
Link | Resource |
---|---|
https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 | Broken Link Third Party Advisory |
https://jvn.jp/en/vu/JVNVU98305100/ | Patch Third Party Advisory |
https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo | Exploit Mitigation Third Party Advisory |
https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2022-09-26 11:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-36159
Mitre link : CVE-2022-36159
CVE.ORG link : CVE-2022-36159
JSON object : View
Products Affected
contec
- fxa3200_firmware
- fxa3000
- fxa3000_firmware
- fxa2000
- fxa3020
- fxa2000_firmware
- fxa3200
- fxa3020_firmware
CWE
CWE-798
Use of Hard-coded Credentials