The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24386 The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.
Fixes

Solution

No solution given by the vendor.


Workaround

Red Lion notes the DA50N series product is at end-of-life and does not intend to release a software update to address these vulnerabilities. Users are encouraged to apply workarounds and mitigations or upgrade their device to DA50A and DA70A. Red Lion has provided the following workarounds to help mitigate the risk of these vulnerabilities: Do not install image files that are obtained from sources other than the official Red Lion website. When downloading images from Red Lion’s website, ensure the validity of the server’s TLS certificate. If package files or images are to be stored before deployment, ensure they are stored in a secure manner. Minimize the risk of unauthorized installation via SD card by limiting physical access to the device. Ensure the default UI password is changed to one meeting standard security practices. Change the admin, rlcuser and techsup account passwords from their default values. Disable the SSH service and keep the telnet service disabled if they are not required. Do not re‐use the same password for securing multiple resources. Limit access to configuration files that contain valuable credentials. Ensure the use of secure credentials when configuring optional services. Enable only the minimum set of optional services required for the application.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:55:12.150Z

Reserved: 2022-03-21T00:00:00.000Z

Link: CVE-2022-1039

cve-icon Vulnrichment

Updated: 2024-08-02T23:47:43.275Z

cve-icon NVD

Status : Modified

Published: 2022-04-20T16:15:08.360

Modified: 2024-11-21T06:39:54.660

Link: CVE-2022-1039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.