The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 Mitigation Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-23T00:00:00

Updated: 2022-06-24T15:00:29

Reserved: 2022-05-10T00:00:00


Link: CVE-2022-1666

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-06-24T15:15:09.497

Modified: 2022-07-05T15:48:49.143


Link: CVE-2022-1666

JSON object: View

cve-icon Redhat Information

No data.

CWE