#VU60304 Use of a broken or risky cryptographic algorithm in Airspan Networks products - CVE-2022-21800
Published: February 4, 2022
Vulnerability identifier: #VU60304
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-21800
CWE-ID: CWE-327
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
MMP
PTP C-series
PTMP C-series
PTMP A5x
MMP
PTP C-series
PTMP C-series
PTMP A5x
Software vendor:
Airspan Networks
Airspan Networks
Description
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to the affected product uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. A remote authenticated attacker can crack the hashed passwords.
Remediation
Install updates from vendor's website.