phicomm k2_firmware 解释冲突
CVE编号
CVE-2022-25219利用情况
暂无补丁情况
N/A披露时间
2022-03-11漏洞描述
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://www.tenable.com/security/research/tra-2022-01 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | phicomm | k2g_firmware | * | Up to (including) 22.6.3.20 | |||||
运行在以下环境 | |||||||||
系统 | phicomm | k2p_firmware | * | Up to (including) 20.4.1.7 | |||||
运行在以下环境 | |||||||||
系统 | phicomm | k2_firmware | * | Up to (including) 22.5.9.163 | |||||
运行在以下环境 | |||||||||
系统 | phicomm | k3c_firmware | * | Up to (including) 32.1.15.93 | |||||
运行在以下环境 | |||||||||
系统 | phicomm | k3_firmware | * | Up to (including) 21.5.37.246 | |||||
运行在以下环境 | |||||||||
硬件 | phicomm | k2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | phicomm | k2g | - | - | |||||
运行在以下环境 | |||||||||
硬件 | phicomm | k2p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | phicomm | k3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | phicomm | k3c | - | - | |||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-436 | 解释冲突 |
NVD-CWE-Other |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论