The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24952 The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
Fixes

Solution

Secheron recommends updating its software to the latest version: SEPCOS Single Package firmware (1.23.xx feature level): Update to 1.23.22 or higher version SEPCOS Single Package firmware (1.24.xx feature level): Update to 1.24.8 or higher version SEPCOS Single Package firmware (1.25.xx feature level): Update to 1.25.3 or higher version


Workaround

Additional workarounds are suggested to help reduce the risk: Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions. Limit remote access and close Ports 80 and 443 at the switch level. Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices. Check device logs during periodic maintenance for unauthorized changes or access.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:16:30.731Z

Reserved: 2022-05-10T00:00:00.000Z

Link: CVE-2022-1666

cve-icon Vulnrichment

Updated: 2024-08-03T00:10:03.910Z

cve-icon NVD

Status : Modified

Published: 2022-06-24T15:15:09.497

Modified: 2024-11-21T06:41:12.750

Link: CVE-2022-1666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.