ID

VAR-202206-0191


CVE

CVE-2022-29730


TITLE

plural  usr  Product use of hardcoded credentials vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-010889

DESCRIPTION

USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device. usr-g808 firmware, usr-g807 firmware, usr-g806 firmware etc. usr The product contains a vulnerability related to the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. USR-G806 adopts high performance embedded CPU whichcan support 580MHz working frequency and can be widely used in Smart Grid,Smart Home, public bus and Vending machine for data transmission at highspeed. USR-G806 supports various functions such as APN card, VPN, WIFIDOG,flow control and has many advantages including high reliability, simpleoperation, reasonable price. USR-G806 supports WAN interface, LAN interface,WLAN interface, 4G interface. The 'usr' account with password 'www.usr.cn' has the highestprivileges on the device. The password is also the default WLAN password.Tested on: GNU/Linux 3.10.14 (mips)OpenWrt/Linaro GCC 4.8-2014.04Ralink SoC MT7628 PCIe RC modeBusyBox v1.22.1uhttpdLua

Trust: 2.34

sources: NVD: CVE-2022-29730 // JVNDB: JVNDB-2022-010889 // CNNVD: CNNVD-202206-263 // ZSL: ZSL-2022-5705 // VULMON: CVE-2022-29730

IOT TAXONOMY

category:['network device']sub_category:router

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:usrmodel:usr-g806scope:eqversion:1.0.36

Trust: 1.0

vendor:usrmodel:usr-g807scope:eqversion:1.0.36

Trust: 1.0

vendor:usrmodel:usr-lg220-lscope:eqversion:1.2.7

Trust: 1.0

vendor:usrmodel:usr-g808scope:eqversion:1.0.36

Trust: 1.0

vendor:usrmodel:usr-g800v2scope:eqversion:1.0.36

Trust: 1.0

vendor:usrmodel:usr-g800v2scope: - version: -

Trust: 0.8

vendor:usrmodel:usr-g808scope: - version: -

Trust: 0.8

vendor:usrmodel:usr-g806scope: - version: -

Trust: 0.8

vendor:usrmodel:usr-g807scope: - version: -

Trust: 0.8

vendor:usrmodel:usr-lg220-lscope: - version: -

Trust: 0.8

vendor:jinan usr iotmodel:4g lte industrial cellular vpn routerscope:eqversion:usr-g808)

Trust: 0.1

vendor:jinan usr iotmodel:4g lte industrial cellular vpn routerscope:eqversion:1.2.7 (usr-lg220-l)

Trust: 0.1

sources: ZSL: ZSL-2022-5705 // JVNDB: JVNDB-2022-010889 // NVD: CVE-2022-29730

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-29730
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-29730
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202206-263
value: CRITICAL

Trust: 0.6

ZSL: ZSL-2022-5705
value: (5/5)

Trust: 0.1

nvd@nist.gov: CVE-2022-29730
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2022-29730
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-29730
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZSL: ZSL-2022-5705 // JVNDB: JVNDB-2022-010889 // CNNVD: CNNVD-202206-263 // NVD: CVE-2022-29730

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.0

problemtype:Use hard-coded credentials (CWE-798) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-010889 // NVD: CVE-2022-29730

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-263

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202206-263

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2022-5705

PATCH

title:USR IOT 4G LTE Industrial Cellular VPN Router Repair measures for trust management problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195740

Trust: 0.6

sources: CNNVD: CNNVD-202206-263

EXTERNAL IDS

db:NVDid:CVE-2022-29730

Trust: 3.5

db:ZSLid:ZSL-2022-5705

Trust: 2.6

db:JVNDBid:JVNDB-2022-010889

Trust: 0.8

db:CNNVDid:CNNVD-202206-263

Trust: 0.6

db:CXSECURITYid:WLB-2022040086

Trust: 0.1

db:EXPLOIT-DBid:50894

Trust: 0.1

db:PACKETSTORMid:166813

Trust: 0.1

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2022-29730

Trust: 0.1

sources: ZSL: ZSL-2022-5705 // OTHER: None // VULMON: CVE-2022-29730 // JVNDB: JVNDB-2022-010889 // CNNVD: CNNVD-202206-263 // NVD: CVE-2022-29730

REFERENCES

url:https://www.zeroscience.mk/en/vulnerabilities/zsl-2022-5705.php

Trust: 2.5

url:https://www.pusr.com/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-29730

Trust: 0.9

url:https://cxsecurity.com/cveshow/cve-2022-29730/

Trust: 0.6

url:https://packetstormsecurity.com/files/166813/

Trust: 0.1

url:https://cxsecurity.com/issue/wlb-2022040086

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/224930

Trust: 0.1

url:https://www.exploit-db.com/exploits/50894

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2022-29730

Trust: 0.1

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZSL: ZSL-2022-5705 // OTHER: None // VULMON: CVE-2022-29730 // JVNDB: JVNDB-2022-010889 // CNNVD: CNNVD-202206-263 // NVD: CVE-2022-29730

CREDITS

Vulnerability discovered by Gjoko Krstic

Trust: 0.1

sources: ZSL: ZSL-2022-5705

SOURCES

db:ZSLid:ZSL-2022-5705
db:OTHERid: -
db:VULMONid:CVE-2022-29730
db:JVNDBid:JVNDB-2022-010889
db:CNNVDid:CNNVD-202206-263
db:NVDid:CVE-2022-29730

LAST UPDATE DATE

2025-01-30T21:45:23.807000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2022-5705date:2022-05-29T00:00:00
db:VULMONid:CVE-2022-29730date:2022-06-02T00:00:00
db:JVNDBid:JVNDB-2022-010889date:2023-08-17T08:34:00
db:CNNVDid:CNNVD-202206-263date:2022-06-13T00:00:00
db:NVDid:CVE-2022-29730date:2024-11-21T06:59:37.187

SOURCES RELEASE DATE

db:ZSLid:ZSL-2022-5705date:2022-04-20T00:00:00
db:VULMONid:CVE-2022-29730date:2022-06-02T00:00:00
db:JVNDBid:JVNDB-2022-010889date:2023-08-17T00:00:00
db:CNNVDid:CNNVD-202206-263date:2022-06-02T00:00:00
db:NVDid:CVE-2022-29730date:2022-06-02T14:15:50.827