CVE-2022-36558

Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-08-29 23:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-36558

Mitre link : CVE-2022-36558

CVE.ORG link : CVE-2022-36558


JSON object : View

Products Affected

seiko-sol

  • skybridge_mb-a110_firmware
  • skybridge_mb-a110
  • skybridge_mb-a100
  • skybridge_mb-a100_firmware
CWE
CWE-798

Use of Hard-coded Credentials