CWE
287 798
Advisory Published
Updated

CVE-2022-40242: MegaRAC Default Credentials Vulnerability

First published: Mon Dec 05 2022(Updated: )

MegaRAC Default Credentials Vulnerability

Credit: cret@cert.org

Affected SoftwareAffected VersionHow to fix
Ami Megarac Sp-x=12
Ami Megarac Sp-x=13

Remedy

AMI-SA-2023001

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-40242?

    CVE-2022-40242 is a vulnerability in MegaRAC that allows attackers to gain unauthorized access to the system using default credentials.

  • What is the severity of CVE-2022-40242?

    CVE-2022-40242 has a severity rating of 9.8, which is considered critical.

  • Which software versions are affected by CVE-2022-40242?

    CVE-2022-40242 affects Ami Megarac Sp-x versions 12 and 13.

  • How can attackers exploit CVE-2022-40242?

    Attackers can exploit CVE-2022-40242 by using default credentials to gain unauthorized access to the vulnerable MegaRAC system.

  • How can I mitigate the CVE-2022-40242 vulnerability?

    To mitigate CVE-2022-40242, it is recommended to change the default credentials of the MegaRAC system to strong and unique ones.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203