cvelist/2022/47xxx/CVE-2022-47558.json

118 lines
3.9 KiB
JSON
Raw Normal View History

2022-12-19 17:00:40 +00:00
{
2023-09-19 13:00:37 +00:00
"data_version": "4.0",
2022-12-19 17:00:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-47558",
2023-09-19 13:00:37 +00:00
"ASSIGNER": "cve-coordination@incibe.es",
"STATE": "PUBLIC"
2022-12-19 17:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-19 13:00:37 +00:00
"value": "** UNSUPPPORTED WHEN ASSIGNED ** Devices ekorCCP and ekorRCI are vulnerable due to access to the FTP service using default credentials. Exploitation of this vulnerability can allow an attacker to modify critical files that could allow the creation of new users, delete or modify existing users, modify configuration files, install rootkits or backdoors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ormazabal",
"product": {
"product_data": [
{
"product_name": "ekorCCP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "601j"
}
]
}
},
{
"product_name": "ekorRCI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "601j"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ormazabal-products",
"refsource": "MISC",
"name": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ormazabal-products"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Ormazabal recommends upgrading to updated models."
}
],
"value": "Ormazabal recommends upgrading to updated models."
}
],
"credits": [
{
"lang": "en",
"value": "Jacinto Moral Matell\u00e1n"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
2022-12-19 17:00:40 +00:00
}
]
}
}