Vulnerability Details : CVE-2022-36308
Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.
Products affected by CVE-2022-36308
- Airspan » Airvelocity 1500 FirmwareVersions from including (>=) 9.3.0.01249 and up to, including, (<=) 15.18.00.2511cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36308
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36308
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2022-36308
-
Storing a password in plaintext may result in a system compromise.Assigned by: cve-assign@fb.com (Secondary)
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-36308
-
https://helpdesk.airspan.com/browse/TRN3-1692
Permissions Required;Vendor Advisory
-
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x
Third Party Advisory
Jump to