cvelist/2022/1xxx/CVE-2022-1318.json

108 lines
4.0 KiB
JSON
Raw Normal View History

2022-04-12 00:01:30 +00:00
{
"CVE_data_meta": {
2022-04-20 16:01:26 +00:00
"ASSIGNER": "ics-cert@hq.dhs.gov",
2022-04-12 00:01:30 +00:00
"ID": "CVE-2022-1318",
2022-04-20 16:01:26 +00:00
"STATE": "PUBLIC",
"TITLE": "Hills ComNav Inadequate Encryption Strength"
2022-04-12 00:01:30 +00:00
},
2022-04-20 16:01:26 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ComNav",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "All",
"version_value": "3002-19"
}
]
}
}
]
},
"vendor_name": "Interlogix"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Dr Paul Gardner-Stephen, Flinders University and DEWC Systems, Australia "
},
{
"lang": "eng",
"value": "Jacob Thompson, Flinders University, Australia"
},
{
"lang": "eng",
"value": "Dr Samuel Chenoweth, Defence Science and Technology Group, Australia"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-04-12 00:01:30 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-04-20 16:01:26 +00:00
"value": "Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-326 Inadequate Encryption Strength"
}
]
2022-04-12 00:01:30 +00:00
}
]
2022-04-20 16:01:26 +00:00
},
"references": {
"reference_data": [
{
"name": "https://www.corporate.carrier.com/Images/CARR-PSA-Hills-ComNav-002-1121_tcm558-149392.pdf",
"refsource": "CONFIRM",
"url": "https://www.corporate.carrier.com/Images/CARR-PSA-Hills-ComNav-002-1121_tcm558-149392.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Carrier recommends users upgrade to Version 4000-12 or later, which is the latest supported version at the time of this publication. Please contact the Hills distributor to acquire the firmware update.\nMore information on this issue can be found in Carrier product security advisory number CARR-PSA-002-1121.\n"
}
],
"source": {
"advisory": "CARR-PSA-2021-02",
"discovery": "EXTERNAL"
2022-04-12 00:01:30 +00:00
}
}