{ "id": "CVE-2022-26671", "sourceIdentifier": "twcert@cert.org.tw", "published": "2022-04-07T19:15:09.010", "lastModified": "2024-11-21T06:54:18.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Taiwan Secom Dr.ID Access Control system\u2019s login page has a hard-coded credential in the source code. An unauthenticated remote attacker can use the hard-coded credential to acquire partial system information and modify system setting to cause partial disrupt of service." }, { "lang": "es", "value": "La p\u00e1gina de inicio de sesi\u00f3n de Taiwan Secom Dr.ID Access Control system presenta una credencial embebida en el c\u00f3digo fuente. Un atacante remoto no autenticado puede usar la credencial embebida para adquirir informaci\u00f3n parcial del sistema y modificar la configuraci\u00f3n del sistema para causar una interrupci\u00f3n parcial del servicio" } ], "metrics": { "cvssMetricV31": [ { "source": "twcert@cert.org.tw", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.4 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "twcert@cert.org.tw", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-798" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-798" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:secom:dr.id_access_control:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4A5D733-9622-42E5-9CA2-0CC1FC75D822" }, { "vulnerable": true, "criteria": "cpe:2.3:a:secom:dr.id_attendance_system:3.4.0.0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D148F97E-F617-4EFC-B559-FF46F32FA614" } ] } ] } ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html", "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-5971-b691f-1.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }