Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.
References
Link | Resource |
---|---|
https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54 | Broken Link |
https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/ | Product Vendor Advisory |
Configurations
Information
Published : 2022-08-29 16:15
Updated : 2022-09-02 11:58
NVD link : CVE-2022-36558
Mitre link : CVE-2022-36558
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
seiko-sol
- skybridge_mb-a110
- skybridge_mb-a100
- skybridge_mb-a110_firmware
- skybridge_mb-a100_firmware