CVE-2022-28376
Published Apr 3, 2022
Last updated a year ago
Overview
- Description
- Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:verizon:lvskihp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3FAA729-9CCF-40F5-806C-0E26E13A0278", "versionEndIncluding": "2022-02-15" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:verizon:lvskihp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E2FE22C0-3735-4824-A6E7-BE9E13DEB381" } ], "operator": "OR" } ], "operator": "AND" } ]