The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-24T15:00:29.585563Z

Updated: 2024-09-16T19:47:16.174Z

Reserved: 2022-05-10T00:00:00

Link: CVE-2022-1666

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-06-24T15:15:09.497

Modified: 2022-07-05T15:48:49.143

Link: CVE-2022-1666

cve-icon Redhat

No data.