Sequi PortBloque S has a improper authentication issues which may allow an attacker to bypass the authentication process and gain user-level access to the device.
Fixes

Solution

No solution given by the vendor.


Workaround

Users should take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from business networks. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:50:46.946Z

Reserved: 2022-08-04T00:00:00.000Z

Link: CVE-2022-2662

cve-icon Vulnrichment

Updated: 2024-08-03T00:46:03.638Z

cve-icon NVD

Status : Modified

Published: 2022-08-16T21:15:09.783

Modified: 2024-11-21T07:01:28.020

Link: CVE-2022-2662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.