Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote attacker to login to the database with unrestricted access.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-48313 Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote attacker to login to the database with unrestricted access.
Fixes

Solution

No solution given by the vendor.


Workaround

Sewio also recommends the following workarounds to reduce the risk of exploitation: * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . * Locate control system networks and remote devices behind firewalls and isolate them from business networks. * Manually change the database password.  

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T22:00:00.806Z

Reserved: 2022-12-21T18:52:32.358Z

Link: CVE-2022-45444

cve-icon Vulnrichment

Updated: 2024-08-03T14:09:57.062Z

cve-icon NVD

Status : Modified

Published: 2023-01-18T01:15:12.717

Modified: 2024-11-21T07:29:16.193

Link: CVE-2022-45444

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.