mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-08 22:18:22 +00:00
24 lines
1.3 KiB
JSON
24 lines
1.3 KiB
JSON
{
|
|
"id": "CVE-2022-47036",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-03-18T03:15:05.957",
|
|
"lastModified": "2024-03-18T12:38:25.490",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Siklu TG Terragraph devices before approximately 2.1.1 have a hardcoded root password that has been revealed via a brute force attack on an MD5 hash. It can be used for \"debug login\" by an admin. NOTE: the vulnerability is not fixed by the 2.1.1 firmware; instead, it is fixed in newer hardware, which would typically be used with firmware 2.1.1 or later."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los dispositivos Siklu TG Terragraph anteriores a aproximadamente 2.1.1 tienen una contrase\u00f1a de root codificada que se ha revelado mediante un ataque de fuerza bruta en un hash MD5. Un administrador puede utilizarlo para \"iniciar sesi\u00f3n de depuraci\u00f3n\". NOTA: la vulnerabilidad no se soluciona con el firmware 2.1.1; en cambio, se soluciona en hardware m\u00e1s nuevo, que normalmente se usar\u00eda con el firmware 2.1.1 o posterior."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |