CVE-2026-22543
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-07

Last updated on: 2026-01-08

Assigner: S21sec

Description
The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-07
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thales cyber_solutions *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-261 Obscuring a password with a trivial encoding does not protect the password.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by monitoring HTTP traffic for base64-encoded credentials in the HTTP headers during login requests. Using network packet capture tools like tcpdump or Wireshark, you can filter HTTP traffic and inspect the Authorization headers for base64 strings. For example, a command like 'tcpdump -A -s 0 'tcp port 80'' can capture HTTP traffic, and you can look for 'Authorization: Basic' headers which indicate base64-encoded credentials.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of HTTP for accessing the device's web server and instead using HTTPS to encrypt the credentials in transit. If HTTPS is not available, restrict network access to the device's web server to trusted networks only to reduce the risk of interception. Additionally, consider changing default credentials and monitoring for unauthorized access attempts.


Can you explain this vulnerability to me?

This vulnerability occurs because the credentials needed to access the device's web server are sent encoded in base64 within the HTTP headers. Base64 encoding is not a secure encryption method, so an attacker who intercepts the web request during login can decode the base64 string and obtain the credentials.


How can this vulnerability impact me? :

An attacker who intercepts the login request can obtain the credentials and potentially gain unauthorized access to the device's web server. This could lead to unauthorized control or access to sensitive information on the device.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart