Risk | High |
Patch available | NO |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-26516 CVE-2022-1039 CVE-2022-27179 |
CWE-ID | CWE-345 CWE-521 CWE-522 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
DA50N Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Red Lion Controls |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU62370
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2022-26516
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromsie the target system.
The vulnerability exists due to insufficient verification of data authenticity. A remote administrator can install a maliciously modified package file when updating the device via the web user interface.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsDA50N: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-104-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62371
Risk: High
CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2022-1039
CWE-ID:
CWE-521 - Weak Password Requirements
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform brute-force attack and guess the password.
The vulnerability exists due to weak password requirements. A remote attacker can perform a brute-force attack and guess users' passwords, leading to privilege escalation.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsDA50N: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-104-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62372
Risk: Medium
CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2022-27179
CWE-ID:
CWE-522 - Insufficiently Protected Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficiently protected credentials. A remote user can obtain the stored credentials and gain access to the protected resource.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsDA50N: All versions
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-22-104-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.