Unknown
CVE-2022-22813
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-22813
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- easergy p141 firmware -,
- easergy p142 firmware -,
- easergy p143 firmware -,
- easergy p145 firmware -,
- easergy p241 firmware -,
- easergy p242 firmware -,
- easergy p243 firmware -,
- easergy p341 firmware -,
- easergy p342 firmware -,
- easergy p343 firmware -,
- easergy p344 firmware -,
- easergy p345 firmware -,
- easergy p441 firmware -,
- easergy p442 firmware -,
- easergy p443 firmware -,
- easergy p444 firmware -,
- easergy p445 firmware -,
- easergy p446 firmware -,
- easergy p541 firmware -,
- easergy p542 firmware -,
- easergy p543 firmware -,
- easergy p544 firmware -,
- easergy p545 firmware -,
- easergy p546 firmware -,
- easergy p642 firmware -,
- easergy p643 firmware -,
- easergy p645 firmware -,
- easergy p741 firmware -,
- easergy p742 firmware -,
- easergy p743 firmware -,
- easergy p746 firmware -,
- easergy p841 firmware -,
- easergy p849 firmware -
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: