First published: Tue Nov 29 2022(Updated: )
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Rtl8111ep-cg Firmware | <=3.0.0.2019090 | |
Realtek Rtl8111ep-cg Firmware | =5.0.10 | |
Realtek Rtl8111ep-cg | ||
Realtek Rtl8111fp-cg Firmware | <=3.0.0.2019090 | |
Realtek Rtl8111fp-cg Firmware | =5.0.10 | |
Realtek Rtl8111fp-cg |
Contact tech support from Realtek
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32967.
CVE-2022-32967 has a severity rating of 2.1 (low).
The vulnerability allows an unauthenticated physical attacker to acquire partial system information such as serial number and server information.
The affected software versions are Realtek Rtl8111ep-cg Firmware up to and including 3.0.0.2019090, and Realtek Rtl8111fp-cg Firmware up to and including 3.0.0.2019090.
To fix the vulnerability, Realtek Rtl8111ep-cg Firmware and Realtek Rtl8111fp-cg Firmware should be updated to versions higher than 3.0.0.2019090.