CRITICAL · 9.8

CVE-2022-3203

On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get ...

Vulnerability Description

On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
OringnetIap-420\+ Firmware2.0m
OringnetIap-420\+-
OringnetIap-420 Firmware2.0m
OringnetIap-420-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-3203?

CVE-2022-3203 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get ...

How severe is CVE-2022-3203?

CVE-2022-3203 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-3203?

Check the references section above for vendor advisories and patch information. Affected products include: Oringnet Iap-420\+ Firmware, Oringnet Iap-420\+, Oringnet Iap-420 Firmware, Oringnet Iap-420.