CVE-2022-32967
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
29/11/2022
Last modified:
30/11/2022
Description
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Impact
Base Score 3.x
2.10
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:realtek:rtl8111ep-cg_firmware:*:*:*:*:*:*:*:* | 3.0.0.2019090 (including) | |
| cpe:2.3:o:realtek:rtl8111ep-cg_firmware:5.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:h:realtek:rtl8111ep-cg:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:realtek:rtl8111fp-cg_firmware:*:*:*:*:*:*:*:* | 3.0.0.2019090 (including) | |
| cpe:2.3:o:realtek:rtl8111fp-cg_firmware:5.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:h:realtek:rtl8111fp-cg:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



