Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-32967: Realtek RTL8111EP-CG/RTL8111FP-CG - Observable Discrepancy

RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.

CVE
#vulnerability#hard_coded_credentials#auth

:::

  • 首頁
  • 資安服務
  • 台灣漏洞揭露平台 (TVN)
  • TVN (Taiwan Vulnerability Note) 漏洞公告

Realtek RTL8111EP-CG/RTL8111FP-CG - Use of Hard-coded Credentials

TVN ID

TVN-202209016

CVE ID

CVE-2022-32967

CVSS

2.1 (Low)
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

影響產品

Realtek RTL8111EP-CG/RTL8111FP-CG Firmware version before 3.0.0.2019090 (old framework) or 5.0.10 (new framework)

問題描述

RTL8111EP-CG/RTL8111FP-CG之DASH功能使用Hard-coded password,本地端攻擊者不須權限,在其他使用者重啟主機時,可以使用Hard-coded預設密碼,取得序列號和服務訊息等部分主機資訊。

解決方法

聯繫Realtek進行版本更新

漏洞通報者

Realtek

公開日期

2022-11-29

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907