Vulnerability Details : CVE-2022-25219
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).
Products affected by CVE-2022-25219
- cpe:2.3:o:phicomm:k2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:phicomm:k3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:phicomm:k3c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:phicomm:k2g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:phicomm:k2p_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-25219
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-25219
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
8.4
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.5
|
5.9
|
NIST |
CWE ids for CVE-2022-25219
-
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-25219
-
https://www.tenable.com/security/research/tra-2022-01
Unpatchable Vulnerabilities in Phicomm Router Firmware - Research Advisory | TenableĀ®Exploit;Third Party Advisory
Jump to