The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
Solution:
Workaround:
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 | us government resource third party advisory mitigation |