By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-30T18:42:40.979239Z

Updated: 2024-09-16T18:55:30.368Z

Reserved: 2022-06-24T00:00:00

Link: CVE-2022-2197

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-06-30T19:15:08.280

Modified: 2022-07-13T18:24:27.743

Link: CVE-2022-2197

cve-icon Redhat

No data.