Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-48313 | Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the application’s database. This could allow a remote attacker to login to the database with unrestricted access. |
Solution
No solution given by the vendor.
Workaround
Sewio also recommends the following workarounds to reduce the risk of exploitation: * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . * Locate control system networks and remote devices behind firewalls and isolate them from business networks. * Manually change the database password.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 |
|
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T22:00:00.806Z
Reserved: 2022-12-21T18:52:32.358Z
Link: CVE-2022-45444
Updated: 2024-08-03T14:09:57.062Z
Status : Modified
Published: 2023-01-18T01:15:12.717
Modified: 2024-11-21T07:29:16.193
Link: CVE-2022-45444
No data.
OpenCVE Enrichment
No data.
EUVD