CVE-2022-26672
ASUS WebStorage - Use of Hard-coded Credentials
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.
ASUS WebStorage presenta un token de API embebido en el código fuente de la APP. Un atacante remoto no autenticado puede usar este token para establecer conexiones con el servidor y llevar a cabo intentos de inicio de sesión en cuentas de usuario generales. Un inicio de sesión con éxito en una cuenta de usuario general permite al atacante acceder, modificar o eliminar la información de esta cuenta de usuario
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-08 CVE Reserved
- 2022-04-22 CVE Published
- 2024-07-14 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-6041-7bd67-1.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asus Search vendor "Asus" | Webstorage Search vendor "Asus" for product "Webstorage" | < 3.10.2 Search vendor "Asus" for product "Webstorage" and version " < 3.10.2" | android |
Affected
|