CVE-2026-22543
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-08
Assigner: S21sec
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thales | cyber_solutions | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-261 | Obscuring a password with a trivial encoding does not protect the password. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring HTTP traffic for base64-encoded credentials in the HTTP headers during login requests. Using network packet capture tools like tcpdump or Wireshark, you can filter HTTP traffic and inspect the Authorization headers for base64 strings. For example, a command like 'tcpdump -A -s 0 'tcp port 80'' can capture HTTP traffic, and you can look for 'Authorization: Basic' headers which indicate base64-encoded credentials.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of HTTP for accessing the device's web server and instead using HTTPS to encrypt the credentials in transit. If HTTPS is not available, restrict network access to the device's web server to trusted networks only to reduce the risk of interception. Additionally, consider changing default credentials and monitoring for unauthorized access attempts.
Can you explain this vulnerability to me?
This vulnerability occurs because the credentials needed to access the device's web server are sent encoded in base64 within the HTTP headers. Base64 encoding is not a secure encryption method, so an attacker who intercepts the web request during login can decode the base64 string and obtain the credentials.
How can this vulnerability impact me? :
An attacker who intercepts the login request can obtain the credentials and potentially gain unauthorized access to the device's web server. This could lead to unauthorized control or access to sensitive information on the device.