CVE-2022-35513: Inadequate Encryption Strength
(updated )
The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.
References
- github.com/advisories/GHSA-jqhq-pfg3-fg5p
- github.com/p1ckzi/CVE-2022-35513
- github.com/todbot/Blink1Control2/commit/74827462aba3a26d7bf157522f69eec999d7ba85
- github.com/todbot/Blink1Control2/commit/cd9229ef9131bc663f714150c9f8d5cbf818d620
- github.com/todbot/Blink1Control2/commit/efe174823f67bbdcee8863e02df67a130f132075
- github.com/todbot/Blink1Control2/commit/f595d782d2356878188fed423a7dcb84ee8fee9d
- github.com/todbot/Blink1Control2/issues/175
- github.com/todbot/Blink1Control2/releases
- nvd.nist.gov/vuln/detail/CVE-2022-35513
Detect and mitigate CVE-2022-35513 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →