Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://cds.thalesgroup.com/en |
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
|
| Vendors & Products |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials | |
| Title | WEEK ENCODING FOR PASSWORDS | |
| Weaknesses | CWE-261 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2026-01-07T16:57:16.512Z
Reserved: 2026-01-07T14:01:04.829Z
Link: CVE-2026-22543
Updated: 2026-01-07T16:24:29.724Z
Status : Deferred
Published: 2026-01-07T17:16:04.057
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-22543
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:15:15Z