CVE-2022-43096

Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via the UART port.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:m5t:mediatrix_4102s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:m5t:mediatrix_4102s:-:*:*:*:*:*:*:*

History

30 Apr 2025, 15:15

Type Values Removed Values Added
CWE CWE-1191

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://documentation.media5corp.com/display/MP/DGW+Security+Improvement+Notes+v48.5.2718 - Release Notes, Vendor Advisory () https://documentation.media5corp.com/display/MP/DGW+Security+Improvement+Notes+v48.5.2718 - Release Notes, Vendor Advisory
References () https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096 - Exploit, Third Party Advisory () https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096 - Exploit, Third Party Advisory

Information

Published : 2022-11-17 23:15

Updated : 2025-04-30 15:15


NVD link : CVE-2022-43096

Mitre link : CVE-2022-43096

CVE.ORG link : CVE-2022-43096


JSON object : View

Products Affected

m5t

  • mediatrix_4102s_firmware
  • mediatrix_4102s
CWE
NVD-CWE-noinfo CWE-1191

On-Chip Debug and Test Interface With Improper Access Control