Lucene search

K
nvd[email protected]NVD:CVE-2022-28377
HistoryJul 14, 2022 - 1:15 p.m.

CVE-2022-28377

2022-07-1413:15:08
CWE-521
web.nvd.nist.gov
4
verizon 5g
lvskihp
indoorunit
outdoorunit
static credentials
vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.9%

On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints rely on a static account username/password for access control. This password can be generated via a binary included in the firmware, after ascertaining the MAC address of the IDU’s base Ethernet interface, and adding the string DEVICE_MANUFACTURER=‘Wistron_NeWeb_Corp.’ to /etc/device_info to replicate the host environment. This occurs in /etc/init.d/wnc_factoryssidkeypwd (IDU).

Affected configurations

Nvd
Node
verizonlvskihp_indoorunit_firmwareMatch3.4.66.162
AND
verizonlvskihp_indoorunitMatch-
Node
verizonlvskihp_outdoorunit_firmwareMatch3.33.101.0
AND
verizonlvskihp_outdoorunitMatch-
VendorProductVersionCPE
verizonlvskihp_indoorunit_firmware3.4.66.162cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*
verizonlvskihp_indoorunit-cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*
verizonlvskihp_outdoorunit_firmware3.33.101.0cpe:2.3:o:verizon:lvskihp_outdoorunit_firmware:3.33.101.0:*:*:*:*:*:*:*
verizonlvskihp_outdoorunit-cpe:2.3:h:verizon:lvskihp_outdoorunit:-:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.9%

Related for NVD:CVE-2022-28377