CVE-2022-21800
Published Feb 18, 2022
Last updated a year ago
Overview
- Description
- MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:airspan:mimosa_management_platform:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "064DE49C-CD3C-43AF-864E-D8373EAD9B52", "versionEndExcluding": "1.0.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c6x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4650A7AA-DD66-4A8B-BB37-4D6789D60B85", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c6x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "080058F5-00C3-4204-8942-18D5347614B2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c5x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C295D0C-2C21-474D-B38F-0EA15FB59113", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c5x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2C3239C7-ADFF-413E-86CD-EDBD86FB1ACB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c5c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31B5039E-8D62-4EB8-A264-1DBA97CC7289", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c5c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9944E65E-56D0-4010-B27B-FD7FE469EC20" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:a5x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECA42797-2BBB-4622-9F57-2BE53E3D8019", "versionEndExcluding": "2.5.4.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:a5x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1009C19-795D-4F1A-8C82-A22754E0EBC4" } ], "operator": "OR" } ], "operator": "AND" } ]