CVE-2022-50803
Published: 30 December 2025
Summary
CVE-2022-50803 is a critical-severity Use of Default Credentials (CWE-1392) vulnerability. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 27.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires changing default authenticators prior to first use, preventing unauthorized administrative access via known credentials.
Mandates management of accounts including creation, modification, and disabling of unnecessary or default accounts to block unauthorized access.
Enforces secure configuration settings that include non-default credentials and restrictive access configurations for the device.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability involves default credentials enabling unauthorized administrative access, directly mapping to T1078.001: Default Accounts.
NVD Description
JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privileges.
Deeper analysisAI
CVE-2022-50803 is a critical vulnerability in the JM-DATA ONU JF511-TV version 1.0.67, where the device uses default credentials that permit unauthorized access with administrative privileges. This issue, classified under CWE-1392, carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and potential for complete compromise of confidentiality, integrity, and availability.
Remote attackers require no privileges, user interaction, or special conditions to exploit this flaw by simply authenticating with the default credentials. Upon success, they obtain full administrative control over the ONU device, enabling arbitrary actions such as configuration changes, data extraction, or disruption of network services.
Advisories on this vulnerability are published by CXSecurity (WLB-2022060058), IBM X-Force Exchange, Packet Storm Security, and VulnCheck, with the manufacturer's site at https://www.jm-data.com/. Security practitioners should review these references for guidance on mitigations, such as changing default credentials or applying any available firmware updates.
Details
- CWE(s)