Action not permitted
Modal body text goes here.
Modal Title
Modal Body
FKIE_CVE-2022-50981
Vulnerability from fkie_nvd - Published: 2026-02-02 15:16 - Updated: 2026-02-03 16:44
Severity ?
Summary
An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced."
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede obtener acceso completo en los dispositivos afectados ya que se env\u00edan sin contrase\u00f1a por defecto y establecer una no es obligatorio."
}
],
"id": "CVE-2022-50981",
"lastModified": "2026-02-03T16:44:36.630",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Primary"
}
]
},
"published": "2026-02-02T15:16:29.240",
"references": [
{
"source": "info@cert.vde.com",
"url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
},
{
"source": "info@cert.vde.com",
"url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "info@cert.vde.com",
"type": "Primary"
}
]
}
CVE-2022-50981 (GCVE-0-2022-50981)
Vulnerability from cvelistv5 – Published: 2026-02-02 14:12 – Updated: 2026-02-02 17:22
VLAI?
EPSS
Title
Multiple Innomic VibroLine VLX HD 5.0 and avibia AVLX weak password requirements
Summary
An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Innomic | VibroLine VLX1 HD 5.0 |
Affected:
2.1.1340 , ≤ 2.1.1387
(semver)
Affected: 2.1.1866 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2026-02-02 14:11
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-50981",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-02T17:21:57.296726Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-02T17:22:10.010Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX1 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX2 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX4 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX6 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX8 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLX1 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLX2 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLX4 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLX6 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLX8 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "affected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE1 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE2 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE4 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE6 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE8 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLE1 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLE2 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLE4 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLE6 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "AvibiaLine AVLE8 HD 5.0",
"vendor": "avibia",
"versions": [
{
"lessThanOrEqual": "2.1.1387",
"status": "unaffected",
"version": "2.1.1340",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE1 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE2 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE4 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE6 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE8 HD 5.0",
"vendor": "Innomic",
"versions": [
{
"status": "unaffected",
"version": "2.1.1866"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE1 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.4.1116",
"status": "unaffected",
"version": "1.4.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE2 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.4.1116",
"status": "unaffected",
"version": "1.4.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE4 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.4.1116",
"status": "unaffected",
"version": "1.4.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE6 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.4.1116",
"status": "unaffected",
"version": "1.4.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLE8 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.4.1116",
"status": "unaffected",
"version": "1.4.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX1 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.5.1116",
"status": "unaffected",
"version": "1.5.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX2 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.5.1116",
"status": "unaffected",
"version": "1.5.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX4 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.5.1116",
"status": "unaffected",
"version": "1.5.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX6 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.5.1116",
"status": "unaffected",
"version": "1.5.1074",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"firmware"
],
"product": "VibroLine VLX8 HD 4.0",
"vendor": "Innomic",
"versions": [
{
"lessThanOrEqual": "1.5.1116",
"status": "unaffected",
"version": "1.5.1074",
"versionType": "semver"
}
]
}
],
"datePublic": "2026-02-02T14:11:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.\u003cbr\u003e"
}
],
"value": "An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-02T14:40:16.380Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
}
],
"source": {
"advisory": "CERT@VDE#641933",
"discovery": "UNKNOWN"
},
"title": "Multiple Innomic VibroLine VLX HD 5.0 and avibia AVLX weak password requirements",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-50981",
"datePublished": "2026-02-02T14:12:05.100Z",
"dateReserved": "2026-01-12T08:05:55.994Z",
"dateUpdated": "2026-02-02T17:22:10.010Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…