IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could
lead attackers to identify and access vulnerable systems.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Nov 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Eaton
Eaton intelligent Power Protector |
|
CPEs | cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:* | |
Vendors & Products |
Eaton
Eaton intelligent Power Protector |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. | |
Title | Improper access control mechanism in IPP | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Eaton
Published: 2024-11-25T08:54:39.616Z
Updated: 2024-11-25T13:56:45.587Z
Reserved: 2022-06-15T21:05:25.314Z
Link: CVE-2022-33862
Vulnrichment
Updated: 2024-11-25T13:56:41.927Z
NVD
Status : Received
Published: 2024-11-25T09:15:05.440
Modified: 2024-11-25T09:15:05.440
Link: CVE-2022-33862
Redhat
No data.