Description
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
No analysis available yet.
Remediation
Vendor Solution
Contact tech support from Realtek
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-36033 | RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6740-ba9bd-1.html |
|
History
Wed, 23 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-04-23T14:33:40.929Z
Reserved: 2022-06-10T00:00:00.000Z
Link: CVE-2022-32967
Updated: 2024-08-03T07:54:03.438Z
Status : Modified
Published: 2022-11-29T04:15:10.407
Modified: 2024-11-21T07:07:19.910
Link: CVE-2022-32967
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD