CVE-2022-29525

Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*

History

22 Jun 2022, 14:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 9.8
CPE cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*
First Time Rakuten
Rakuten casa
CWE CWE-798
References (MISC) https://jvn.jp/en/jp/JVN46892984/index.html - (MISC) https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry
References (MISC) https://network.mobile.rakuten.co.jp/information/news/product/1033/ - (MISC) https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory

13 Jun 2022, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-13 05:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-29525

Mitre link : CVE-2022-29525

CVE.ORG link : CVE-2022-29525


JSON object : View

Products Affected

rakuten

  • casa
CWE
CWE-798

Use of Hard-coded Credentials