Improper Restriction of Authentication Attempts in spaceLYnk and Wiser for KNX by Schneider Electric
CVE-2022-22810
9.8CRITICAL
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 9 February 2022
Summary
The vulnerability in Schneider Electric's spaceLYnk and Wiser for KNX products allows an attacker to perform excessive authentication attempts, potentially granting unauthorized access. This flaw arises from inadequate restrictions on the number of login attempts, which could be exploited to manipulate admin accounts. Affected versions include spaceLYnk, Wiser for KNX, and fellerLYnk, all up to version 2.6.2.
Affected Version(s)
spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior) spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved