{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T16:27:28.568","vulnerabilities":[{"cve":{"id":"CVE-2022-1039","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2022-04-20T16:15:08.360","lastModified":"2024-11-21T06:39:54.660","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password."},{"lang":"es","value":"La débil contraseña de la interfaz de usuario de la web puede ser explotada por medio de HTTP o HTTPS. Una vez obtenido dicho acceso, pueden cambiarse las demás contraseñas. Puede accederse a la contraseña débil de las cuentas de Linux por medio de SSH o Telnet, el primero de los cuales está habilitado por defecto en las interfaces confiables. Mientras que el servicio SSH no admite el inicio de sesión de root, un usuario que inicie sesión usando cualquiera de las otras cuentas de Linux puede elevar el acceso a root usando el comando su si presenta acceso a la contraseña asociada"}],"metrics":{"cvssMetricV31":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-521"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-521"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redlion:da50n_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"F93A1A27-F8C2-4D80-9C8E-3AEF743178BA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:redlion:da50n:-:*:*:*:*:*:*:*","matchCriteriaId":"B58B0481-AE48-4B7A-B57B-4FA6B573C040"}]}]}],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}