Learn about CVE-2022-47891, a high severity vulnerability in all versions of NetMan 204 by Riello UPS, allowing attackers to reset the administrator password via legitimate recovery function.
This article provides detailed information about CVE-2022-47891, a vulnerability that allows an attacker to reset the administrator password in NetMan 204 devices.
Understanding CVE-2022-47891
CVE-2022-47891 is a security vulnerability in all versions of NetMan 204, a product of Riello UPS. The vulnerability allows an attacker who knows the MAC and serial number of the device to reset the administrator password through the legitimate recovery function.
What is CVE-2022-47891?
The CVE-2022-47891 vulnerability in NetMan 204 enables a malicious actor to reset the administrator password by leveraging knowledge of the device's MAC and serial number.
The Impact of CVE-2022-47891
The impact of this vulnerability is rated as high severity due to the ease with which an attacker can reset the administrator password, potentially leading to unauthorized access and control of the affected device.
Technical Details of CVE-2022-47891
CVE-2022-47891 has been assigned a CVSSv3.1 base score of 8.1, indicating a high severity vulnerability with low attack complexity and network access required. The confidentiality impact is high, while the integrity impact is none.
Vulnerability Description
The vulnerability, categorized under CWE-798 (Use of Hard-coded Credentials), allows attackers with knowledge of MAC and serial numbers to reset the administrator password via the legitimate recovery function.
Affected Systems and Versions
All versions of NetMan 204 are affected by this vulnerability, exposing devices to the risk of unauthorized administrator password reset.
Exploitation Mechanism
By exploiting the vulnerability in NetMan 204, attackers can reset the administrator password using the MAC and serial numbers of the device, bypassing security controls.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-47891, users and administrators are advised to take immediate steps and implement long-term security practices.
Immediate Steps to Take
Users should update NetMan 204 devices to the latest firmware version, change default credentials, restrict network access, and monitor for any unauthorized password resets.
Long-Term Security Practices
In the long term, organizations are recommended to implement secure password policies, conduct regular security audits, and stay informed about firmware updates and security patches.
Patching and Updates
Riello UPS should release patches addressing the CVE-2022-47891 vulnerability to prevent unauthorized password resets and enhance the security of NetMan 204 devices.