ASUS WebStorage - Use of Hard-coded Credentials

CVE-2022-26672
7.3HIGH

Key Information

Vendor
Asus
Status
Webstorage
Vendor
CVE Published:
22 April 2022

Summary

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

Affected Version(s)

WebStorage <= 3.10.1

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: 9.8 to: 7.3 - (HIGH)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.