V
Scaner-VSvulnerability catalog · v4.2
CVE-2022-35513
CVE
HighConfirmedExploit available

The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.

CVSS
7.5
High
EPSS
0.06
p90
Published
2022-01-01
Updated
2022-01-01
Description

The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.

Tags · CWE
Pre-authCrypto
CWE-327
CAPEC-20
CAPEC-97
CAPEC-459
CAPEC-473
CAPEC-475
CAPEC-608
CAPEC-614
Affected products
Blink1control2 ≤ 2.2.7
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Timeline
2022-01-01
Published
2022-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.063 · p90
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-473 · CWE-327
└ via CAPEC-473 · CWE-327
Known exploits — Сканер-ВС
51014
exploitdb · https://www.exploit-db.com/exploits/51014
Enterprise
CVE-2022-35513
github-poc · https://github.com/p1ckzi/CVE-2022-35513
Enterprise
Affected software
ProductVendorStatus
blink1control2*Tracked
Source databases
CVE