cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-36222,https://securityvulnerability.io/vulnerability/CVE-2022-36222,,Nokia Fastmile 3tg00118abad52 devices shipped by Optus are shipped with a default hardcoded admin account of admin:Nq+L5st7o This account can be used locally to access the web admin interface.,Nokia,Fastmile Firmware,8.4,HIGH,0.001129999989643693,false,false,false,false,,false,false,2022-12-21T00:00:00.000Z,0 CVE-2022-36221,https://securityvulnerability.io/vulnerability/CVE-2022-36221,,Nokia Fastmile 3tg00118abad52 is affected by an authenticated path traversal vulnerability which allows attackers to read any named pipe file on the system.,Nokia,Fastmile Firmware,6.5,MEDIUM,0.0007699999841861427,false,false,false,false,,false,false,2022-12-21T00:00:00.000Z,0 CVE-2022-38788,https://securityvulnerability.io/vulnerability/CVE-2022-38788,,"An issue was discovered in Nokia FastMile 5G Receiver 5G14-B 1.2104.00.0281. Bluetooth on the Nokia ODU uses outdated pairing mechanisms, allowing an attacker to passively intercept a paring handshake and (after offline cracking) retrieve the PIN and LTK (long-term key).",Nokia,Fastmile 5g Receiver Firmware,4.3,MEDIUM,0.0005699999746866524,false,false,false,false,,false,false,2022-09-15T11:58:50.000Z,0 CVE-2021-45896,https://securityvulnerability.io/vulnerability/CVE-2021-45896,,Nokia FastMile 3TG00118ABAD52 devices allow privilege escalation by an authenticated user via is_ctc_admin=1 to login_web_app.cgi and use of Import Config File.,Nokia,Fastmile Firmware,8.8,HIGH,0.0017300000181421638,false,false,false,false,,false,false,2021-12-27T21:22:35.000Z,0