Vulnerability Description
The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. This may allow an attacker to send SMS commands directly to the GPS tracker as if they were coming from the GPS owner’s mobile number.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Micodus | Mv720 Firmware | - |
| Micodus | Mv720 | - |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01Third Party AdvisoryUS Government Resource
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2022-2107?
CVE-2022-2107 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. This may allow an attacker to send SMS commands directly to the GPS tr...
How severe is CVE-2022-2107?
CVE-2022-2107 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-2107?
Check the references section above for vendor advisories and patch information. Affected products include: Micodus Mv720 Firmware, Micodus Mv720.