// For flags

CVE-2022-1039

ICSA-22-104-03 Red Lion DA50N

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.

La débil contraseña de la interfaz de usuario de la web puede ser explotada por medio de HTTP o HTTPS. Una vez obtenido dicho acceso, pueden cambiarse las demás contraseñas. Puede accederse a la contraseña débil de las cuentas de Linux por medio de SSH o Telnet, el primero de los cuales está habilitado por defecto en las interfaces confiables. Mientras que el servicio SSH no admite el inicio de sesión de root, un usuario que inicie sesión usando cualquiera de las otras cuentas de Linux puede elevar el acceso a root usando el comando su si presenta acceso a la contraseña asociada

*Credits: Ron Brash of aDolus Technology Inc. reported these vulnerabilities to CISA.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-03-21 CVE Reserved
  • 2022-04-20 CVE Published
  • 2023-11-11 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-521: Weak Password Requirements
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redlion
Search vendor "Redlion"
Da50n Firmware
Search vendor "Redlion" for product "Da50n Firmware"
*-
Affected
in Redlion
Search vendor "Redlion"
Da50n
Search vendor "Redlion" for product "Da50n"
--
Safe