Vulnerability Name: | CVE-2022-22922 (CCN-219977) | ||||||||||||
Assigned: | 2022-02-18 | ||||||||||||
Published: | 2022-02-18 | ||||||||||||
Updated: | 2022-02-25 | ||||||||||||
Summary: | TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-384 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-22922 Source: XF Type: UNKNOWN tplink-cve202222922-priv-esc(219977) Source: CCN Type: GitHub Web site Use of Insufficiently Random Values (CWE-330) on TP-Link Wi-Fi Range Extender Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md Source: CCN Type: TP-Link Web site TL-WA850RE Wi-Fi Range Extender v6 Source: MISC Type: Product, Vendor Advisory https://www.tp-link.com/us/support/download/tl-wa850re/v6/#Firmware | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |