Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-28704 | First vendor Publication | 2022-06-13 |
Vendor | Cve | Last vendor Modification | 2023-08-08 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.2 | ||
Base Score | 7.2 | Environmental Score | 7.2 |
impact SubScore | 5.9 | Temporal Score | 7.2 |
Exploitabality Sub Score | 1.2 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | High | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to log in with the root privilege and perform an arbitrary operation if the product is in its default settings in which is set to accept SSH connections from the WAN side, and is also connected to the Internet with the authentication information unchanged from the default settings. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28704 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
Sources (Detail)
Source | Url |
---|---|
MISC | https://jvn.jp/en/jp/JVN46892984/index.html https://network.mobile.rakuten.co.jp/information/news/product/1033/ |
Alert History
Date | Informations |
---|---|
2023-08-09 17:28:16 |
|
2022-06-22 21:27:16 |
|
2022-06-14 02:07:26 |
|
2022-06-14 02:07:14 |
|
2022-06-13 17:27:11 |
|
2022-06-13 13:27:11 |
|