First published: Thu Oct 20 2022(Updated: )
A hard-coded password vulnerability exists in the telnet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. Use of a hard-coded root password can lead to arbitrary command execution. An attacker can authenticate with hard-coded credentials to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9z | |
Goabode Iota All-in-one Security Kit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29889 is critical with a CVSS score of 9.8.
The hard-coded password vulnerability in CVE-2022-29889 allows an attacker to authenticate with hard-coded credentials and potentially execute arbitrary commands on Abode Systems Inc. iota All-In-One Security Kit Firmware version 6.9Z.
An attacker can exploit CVE-2022-29889 by using the hard-coded root password to authenticate and trigger the vulnerability, allowing for arbitrary command execution.
No, the Goabode Iota All-in-one Security Kit hardware is not vulnerable to CVE-2022-29889.
To fix the hard-coded password vulnerability in Abode Systems Inc. iota All-In-One Security Kit Firmware version 6.9Z, it is recommended to apply the latest firmware update provided by the vendor.