By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.
Fixes

Solution

Exemys no longer sells or maintains RME1 and considers it to be an end-of-life product. Exemys recommends updating to a new supported product in RME2. For more information on upgrading, contact Exemys support.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:15:38.584Z

Reserved: 2022-06-24T00:00:00.000Z

Link: CVE-2022-2197

cve-icon Vulnrichment

Updated: 2024-08-03T00:32:08.800Z

cve-icon NVD

Status : Modified

Published: 2022-06-30T19:15:08.280

Modified: 2024-11-21T07:00:31.490

Link: CVE-2022-2197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.