Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-28376

Опубликовано: 03 апр. 2022
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:verizon:lvskihp_firmware:*:*:*:*:*:*:*:*
Версия до 2022-02-15 (включая)
cpe:2.3:h:verizon:lvskihp:-:*:*:*:*:*:*:*

EPSS

Процентиль: 59%
0.00377
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 8.1
github
почти 4 года назад

Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

EPSS

Процентиль: 59%
0.00377
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287