First published: Mon Mar 07 2022(Updated: )
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phicomm K2 (psg1218) | <=22.5.9.163 | |
Phicomm K2 (psg1218) | ||
Phicomm K3 Firmware | <=21.5.37.246 | |
Phicomm K3 | ||
Phicomm K3c | <=32.1.15.93 | |
Phicomm K3c Firmware | ||
Phicomm K2g | <=22.6.3.20 | |
Phicomm K2g Firmware | ||
Phicomm K2p | <=20.4.1.7 | |
Phicomm K2p Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25213 is classified with high severity due to the improper physical access control and exploitation risk to root access.
To fix CVE-2022-25213, ensure physical access controls are in place and restrict access to the UART port.
CVE-2022-25213 affects devices running specific versions of Phicomm K2, K3, K3c, K2g, and K2p firmware.
The implications of CVE-2022-25213 include potential unauthorized access and control over vulnerable devices.
A workaround for CVE-2022-25213 involves disabling the unprotected UART port when not in use to mitigate risk.