CVE-2022-32967
low-risk
Published 2022-11-29
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Do I need to act?
-
0.22% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.1/10
Low
PHYSICAL
/ LOW complexity
Affected Products (4)
Rtl8111Ep-Cg Firmware
Rtl8111Ep-Cg Firmware
Rtl8111Fp-Cg Firmware
Rtl8111Fp-Cg Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-6740-ba9bd-1.html
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-6740-ba9bd-1.html
20
/ 100
low-risk
Severity
9/34 · Low
Exploitability
1/34 · Minimal
Exposure
10/34 · Low