First published: Mon Oct 17 2022(Updated: )
Multiple Trumpf Products in multiple versions use default privileged Windows users and passwords. An adversary may use these accounts to remotely gain full access to the system.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trumpf Job Order Interface | ||
Trumpf Oseon | <=1.6 | |
Trumpf Trutops Boost | ||
Trumpf Trutops Fab | ||
Trumpf Trutops Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2052 is a vulnerability found in multiple Trumpf products that allows an adversary to remotely gain full access to the system using default privileged Windows users and passwords.
Multiple Trumpf products are affected, including Trumpf Job Order Interface, Trumpf Oseon (version up to 1.6), Trumpf Trutops Boost, Trumpf Trutops Fab, and Trumpf Trutops Monitor.
CVE-2022-2052 has a severity rating of 9.8 (critical).
An adversary can exploit CVE-2022-2052 by using the default privileged Windows users and passwords to remotely gain full access to the system.
More information about CVE-2022-2052 can be found at the following reference: [https://cert.vde.com/en/advisories/VDE-2022-023/](https://cert.vde.com/en/advisories/VDE-2022-023/)