First published: Mon Sep 26 2022(Updated: )
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contec Fxa3000 Firmware | <=1.13.00 | |
Contec Fxa3000 Firmware | ||
Contec Fxa3020 | <=1.13.00 | |
Contec Fxa3020 Firmware | ||
Contec Fxa3200 Firmware | <=1.13.00 | |
Contec Fxa3200 Firmware | ||
Contec Fxa2000 | <1.39.00 | |
Contec Fxa2000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36159 is considered a high severity vulnerability due to the presence of a hard-coded and weak hashed root password that can be exploited easily.
To fix CVE-2022-36159, update the affected Contec FXA3200 firmware to a version higher than 1.13.
CVE-2022-36159 affects the Contec FXA3200 firmware version 1.13 and below.
Yes, CVE-2022-36159 allows unauthorized access to the Wireless LAN Manager interface through compromised credentials.
Yes, a patch is available in the form of a firmware update for the affected Contec devices.