phicomm k2_firmware 解释冲突

CVE编号

CVE-2022-25219

利用情况

暂无

补丁情况

N/A

披露时间

2022-03-11
漏洞描述
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 phicomm k2g_firmware * Up to
(including)
22.6.3.20
运行在以下环境
系统 phicomm k2p_firmware * Up to
(including)
20.4.1.7
运行在以下环境
系统 phicomm k2_firmware * Up to
(including)
22.5.9.163
运行在以下环境
系统 phicomm k3c_firmware * Up to
(including)
32.1.15.93
运行在以下环境
系统 phicomm k3_firmware * Up to
(including)
21.5.37.246
运行在以下环境
硬件 phicomm k2 - -
运行在以下环境
硬件 phicomm k2g - -
运行在以下环境
硬件 phicomm k2p - -
运行在以下环境
硬件 phicomm k3 - -
运行在以下环境
硬件 phicomm k3c - -
CVSS3评分
8.4
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-436 解释冲突
NVD-CWE-Other
阿里云安全产品覆盖情况