cvelist/2022/34xxx/CVE-2022-34906.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2022-07-01 23:00:54 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-07-25 21:00:45 +00:00
"ID": "CVE-2022-34906",
"STATE": "PUBLIC"
2022-07-01 23:00:54 +00:00
},
2022-07-25 21:00:45 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-07-01 23:00:54 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-07-25 21:00:45 +00:00
"value": "A hard-coded cryptographic key is used in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to decrypt sensitive information saved in FileWave, and even send crafted requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://kb.filewave.com/pages/viewpage.action?pageId=55544244",
"refsource": "MISC",
"name": "https://kb.filewave.com/pages/viewpage.action?pageId=55544244"
},
{
"refsource": "MISC",
"name": "https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/",
"url": "https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/"
2022-07-01 23:00:54 +00:00
}
]
}
}