From 543679698300d869f19ba8845472aaa6b5fe015e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Aug 2022 21:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14394.json | 55 +++++++++++- 2020/24xxx/CVE-2020-24402.json | 2 +- 2021/21xxx/CVE-2021-21012.json | 2 +- 2021/21xxx/CVE-2021-21046.json | 2 +- 2021/21xxx/CVE-2021-21048.json | 2 +- 2021/21xxx/CVE-2021-21059.json | 2 +- 2021/26xxx/CVE-2021-26639.json | 89 +++++++++++++++++-- 2022/1xxx/CVE-2022-1069.json | 97 +++++++++++++++++++-- 2022/1xxx/CVE-2022-1373.json | 97 +++++++++++++++++++-- 2022/1xxx/CVE-2022-1748.json | 152 +++++++++++++++++++++++++++++++-- 2022/23xxx/CVE-2022-23747.json | 55 +++++++++++- 2022/23xxx/CVE-2022-23764.json | 82 ++++++++++++++++-- 2022/23xxx/CVE-2022-23765.json | 81 ++++++++++++++++-- 2022/2xxx/CVE-2022-2334.json | 97 +++++++++++++++++++-- 2022/2xxx/CVE-2022-2335.json | 97 +++++++++++++++++++-- 2022/2xxx/CVE-2022-2336.json | 141 ++++++++++++++++++++++++++++-- 2022/2xxx/CVE-2022-2337.json | 97 +++++++++++++++++++-- 2022/2xxx/CVE-2022-2338.json | 97 +++++++++++++++++++-- 2022/2xxx/CVE-2022-2547.json | 97 +++++++++++++++++++-- 2022/2xxx/CVE-2022-2879.json | 18 ++++ 2022/2xxx/CVE-2022-2880.json | 18 ++++ 2022/35xxx/CVE-2022-35122.json | 56 ++++++++++-- 2022/35xxx/CVE-2022-35133.json | 56 ++++++++++-- 2022/35xxx/CVE-2022-35147.json | 56 ++++++++++-- 2022/35xxx/CVE-2022-35148.json | 56 ++++++++++-- 25 files changed, 1497 insertions(+), 107 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2879.json create mode 100644 2022/2xxx/CVE-2022-2880.json diff --git a/2020/14xxx/CVE-2020-14394.json b/2020/14xxx/CVE-2020-14394.json index 0f2675c0b2b..f202a22eeef 100644 --- a/2020/14xxx/CVE-2020-14394.json +++ b/2020/14xxx/CVE-2020-14394.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-14394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "QEMU", + "version": { + "version_data": [ + { + "version_value": "QEMU 6.1.50" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-835" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1908004", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908004" + }, + { + "refsource": "MISC", + "name": "https://gitlab.com/qemu-project/qemu/-/issues/646", + "url": "https://gitlab.com/qemu-project/qemu/-/issues/646" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service." } ] } diff --git a/2020/24xxx/CVE-2020-24402.json b/2020/24xxx/CVE-2020-24402.json index 04f250df491..9e8bef5589b 100644 --- a/2020/24xxx/CVE-2020-24402.json +++ b/2020/24xxx/CVE-2020-24402.json @@ -75,7 +75,7 @@ "description": [ { "lang": "eng", - "value": "Improper Authorization (CWE-285)" + "value": "Incorrect Default Permissions (CWE-276)" } ] } diff --git a/2021/21xxx/CVE-2021-21012.json b/2021/21xxx/CVE-2021-21012.json index d6118e86f1d..e5e0d0b18c4 100644 --- a/2021/21xxx/CVE-2021-21012.json +++ b/2021/21xxx/CVE-2021-21012.json @@ -75,7 +75,7 @@ "description": [ { "lang": "eng", - "value": "Incorrect Authorization (CWE-863)" + "value": "Authorization Bypass Through User-Controlled Key (CWE-639)" } ] } diff --git a/2021/21xxx/CVE-2021-21046.json b/2021/21xxx/CVE-2021-21046.json index 39df812fa3a..6923017e895 100644 --- a/2021/21xxx/CVE-2021-21046.json +++ b/2021/21xxx/CVE-2021-21046.json @@ -75,7 +75,7 @@ "description": [ { "lang": "eng", - "value": "Access of Memory Location After End of Buffer (CWE-788)" + "value": "Out-of-bounds Write (CWE-787)" } ] } diff --git a/2021/21xxx/CVE-2021-21048.json b/2021/21xxx/CVE-2021-21048.json index 614e1575044..3f799456c48 100644 --- a/2021/21xxx/CVE-2021-21048.json +++ b/2021/21xxx/CVE-2021-21048.json @@ -75,7 +75,7 @@ "description": [ { "lang": "eng", - "value": "Access of Memory Location After End of Buffer (CWE-788)" + "value": "Out-of-bounds Write (CWE-787)" } ] } diff --git a/2021/21xxx/CVE-2021-21059.json b/2021/21xxx/CVE-2021-21059.json index aba5ac5fd73..17d28fa06df 100644 --- a/2021/21xxx/CVE-2021-21059.json +++ b/2021/21xxx/CVE-2021-21059.json @@ -75,7 +75,7 @@ "description": [ { "lang": "eng", - "value": "Access of Memory Location After End of Buffer (CWE-788)" + "value": "Out-of-bounds Write (CWE-787)" } ] } diff --git a/2021/26xxx/CVE-2021-26639.json b/2021/26xxx/CVE-2021-26639.json index f203eec3da4..d87dbdd90d1 100644 --- a/2021/26xxx/CVE-2021-26639.json +++ b/2021/26xxx/CVE-2021-26639.json @@ -1,18 +1,95 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2021-26639", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "WISA Smart Wing CMS File Download Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Smart Wing CMS", + "version": { + "version_data": [ + { + "platform": "Linux", + "version_affected": "<", + "version_value": "r18715.20211229" + } + ] + } + } + ] + }, + "vendor_name": "WISA corp." + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability is caused by the lack of validation of input values for specific functions if WISA Smart Wing CMS. Remote attackers can use this vulnerability to leak all files in the server without logging in system." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-494 Download of Code Without Integrity Check" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66875", + "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66875" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1069.json b/2022/1xxx/CVE-2022-1069.json index 09f1ded7c2a..df7f4e9ac92 100644 --- a/2022/1xxx/CVE-2022-1069.json +++ b/2022/1xxx/CVE-2022-1069.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-1069", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Out-of-bounds Read" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A crafted HTTP packet with a large content-length header can create a denial-of-service condition in Softing Secure Integration Server V1.22." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html" + }, + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-4 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1373.json b/2022/1xxx/CVE-2022-1373.json index 1ab85f540e8..941e0f23998 100644 --- a/2022/1xxx/CVE-2022-1373.json +++ b/2022/1xxx/CVE-2022-1373.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-1373", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Relative Path Traversal" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The \u201crestore configuration\u201d feature of Softing Secure Integration Server V1.22 is vulnerable to a directory traversal vulnerability when processing zip files. An attacker can craft a zip file to load an arbitrary dll and execute code. Using the \"restore configuration\" feature to upload a zip file containing a path traversal file may cause a file to be created and executed upon touching the disk." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-23: Relative Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + }, + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-5 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/1xxx/CVE-2022-1748.json b/2022/1xxx/CVE-2022-1748.json index ea11a279729..d1d3f2a8431 100644 --- a/2022/1xxx/CVE-2022-1748.json +++ b/2022/1xxx/CVE-2022-1748.json @@ -1,18 +1,158 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-1748", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server NULL Pointer Dereference" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + }, + { + "product_name": "OPC UA C++ SDK", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V6.00" + } + ] + } + }, + { + "product_name": "edgeConnector Siemens", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeConnector 840D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeConnector Modbus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeAggregator", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite, and uaGate are affected by a NULL pointer dereference vulnerability." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476: NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + }, + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-7.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-7.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-7 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23747.json b/2022/23xxx/CVE-2022-23747.json index 76a455614b5..5172625b276 100644 --- a/2022/23xxx/CVE-2022-23747.json +++ b/2022/23xxx/CVE-2022-23747.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23747", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@checkpoint.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Sony Xperia", + "version": { + "version_data": [ + { + "version_value": "series 1, 5, and Pro" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cpr-zero.checkpoint.com/vulns/cprid-2191/", + "url": "https://cpr-zero.checkpoint.com/vulns/cprid-2191/" + }, + { + "refsource": "MISC", + "name": "https://research.checkpoint.com/2022/bad-alac-one-codec-to-hack-the-whole-world/", + "url": "https://research.checkpoint.com/2022/bad-alac-one-codec-to-hack-the-whole-world/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Sony Xperia series 1, 5, and Pro, an out of bound memory access can occur due to lack of validation of the number of frames being passed during music playback." } ] } diff --git a/2022/23xxx/CVE-2022-23764.json b/2022/23xxx/CVE-2022-23764.json index 127904ce648..f98c2635ee9 100644 --- a/2022/23xxx/CVE-2022-23764.json +++ b/2022/23xxx/CVE-2022-23764.json @@ -1,18 +1,88 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2022-23764", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "TERUTEN WebCube update remote code execution vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WebCube", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<", + "version_name": "1.0.5.5", + "version_value": "1.2.0.0" + } + ] + } + } + ] + }, + "vendor_name": "TERUTEN Co.,Ltd" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-346 Origin Validation Error" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876", + "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/23xxx/CVE-2022-23765.json b/2022/23xxx/CVE-2022-23765.json index 0bd2670436c..b00de6bfbb5 100644 --- a/2022/23xxx/CVE-2022-23765.json +++ b/2022/23xxx/CVE-2022-23765.json @@ -1,18 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2022-23765", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "IPTIME NAS family CSRF vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "NAS1dual, NAS2dual, NAS4dual", + "version": { + "version_data": [ + { + "platform": "Linux, Windows and etc..", + "version_affected": "<", + "version_value": "1.4.86" + } + ] + } + } + ] + }, + "vendor_name": "EFM Networks Co.,Ltd" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability occured by sending a malicious POST request to a specific page while logged in random user from some family of IPTIME NAS. Remote attackers can steal root privileges by changing the password of the root through a POST request." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66877", + "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66877" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2334.json b/2022/2xxx/CVE-2022-2334.json index 9ffdcf00cd3..52a71f0c02e 100644 --- a/2022/2xxx/CVE-2022-2334.json +++ b/2022/2xxx/CVE-2022-2334.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2334", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Uncontrolled Search Path Element" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The application searches for a library dll that is not found. If an attacker can place a dll with this name, then the attacker can leverage it to execute arbitrary code on the targeted Softing Secure Integration Server V1.22." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427: Uncontrolled Search Path Element" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + }, + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-5 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2335.json b/2022/2xxx/CVE-2022-2335.json index fabd558132d..77c076da7d1 100644 --- a/2022/2xxx/CVE-2022-2335.json +++ b/2022/2xxx/CVE-2022-2335.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2335", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Integer Underflow" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A crafted HTTP packet with a -1 content-length header can create a denial-of-service condition in Softing Secure Integration Server V1.22." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-191: Integer Underflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html" + }, + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-4 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2336.json b/2022/2xxx/CVE-2022-2336.json index f193f27dc79..bdc4d6bba5b 100644 --- a/2022/2xxx/CVE-2022-2336.json +++ b/2022/2xxx/CVE-2022-2336.json @@ -1,18 +1,147 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2336", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Improper Authentication" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + }, + { + "product_name": "edgeConnector Siemens", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeConnector 840D", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeConnector Modbus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + }, + { + "product_name": "edgeAggregator", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V3.10" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Softing Secure Integration Server, edgeConnector, and edgeAggregator software ships with the default administrator credentials as `admin` and password as `admin`. This allows Softing to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the `admin` password. There is no warning or prompt to ask the user to change the default password, and to change the password, many steps are required." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + }, + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-6.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-6.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-6 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2337.json b/2022/2xxx/CVE-2022-2337.json index a3de39ee27e..5f5e110233d 100644 --- a/2022/2xxx/CVE-2022-2337.json +++ b/2022/2xxx/CVE-2022-2337.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2337", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server NULL Pointer Dereference" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A crafted HTTP packet with a missing HTTP URI can create a denial-of-service condition in Softing Secure Integration Server V1.22." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476: NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html" + }, + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-4 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2338.json b/2022/2xxx/CVE-2022-2338.json index 5dd27fff32f..e1cc365e0ac 100644 --- a/2022/2xxx/CVE-2022-2338.json +++ b/2022/2xxx/CVE-2022-2338.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2338", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server Cleartext Transmission of Sensitive Information" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + }, + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-5 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2547.json b/2022/2xxx/CVE-2022-2547.json index 79fbc922050..9d51611e181 100644 --- a/2022/2xxx/CVE-2022-2547.json +++ b/2022/2xxx/CVE-2022-2547.json @@ -1,18 +1,103 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2022-2547", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Softing Secure Integration Server NULL Pointer Dereference" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Secure Integration Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "V1.22" + } + ] + } + } + ] + }, + "vendor_name": "Softing" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A crafted HTTP packet without a content-type header can create a denial-of-service condition in Softing Secure Integration Server V1.22." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476: NULL Pointer Dereference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html", + "refsource": "CONFIRM", + "url": "https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html" + }, + { + "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04", + "refsource": "CONFIRM", + "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Softing released new versions to address these vulnerabilities and notified known users of the releases. Users are advised to update to the new versions:\nSofting Secure Integration Server V1.30 \n\nThe latest software packages can be downloaded from the Softing website. \n\nSofting recommends the following mitigations and workarounds: \nChange the admin password or create a new user with administrative rights and delete the default admin user. \nConfigure the Windows firewall to block network requests to IP port 9000. \nDisable the HTTP Server in NGINX configuration of the Softing Secure Integration Server, only using the HTTPS server. \nFor more details on these vulnerabilities and mitigations, users should see SYT-2022-4 on the Softing security website." + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2879.json b/2022/2xxx/CVE-2022-2879.json new file mode 100644 index 00000000000..81ec110ba0d --- /dev/null +++ b/2022/2xxx/CVE-2022-2879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2880.json b/2022/2xxx/CVE-2022-2880.json new file mode 100644 index 00000000000..bd6b610996d --- /dev/null +++ b/2022/2xxx/CVE-2022-2880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35122.json b/2022/35xxx/CVE-2022-35122.json index 3fe9c80a694..bf379b2e7a0 100644 --- a/2022/35xxx/CVE-2022-35122.json +++ b/2022/35xxx/CVE-2022-35122.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35122", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35122", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An access control issue in Ecowitt GW1100 Series Weather Stations <=GW1100B_v2.1.5 allows unauthenticated attackers to access sensitive information including device and local WiFi passwords." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/", + "refsource": "MISC", + "name": "https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/" } ] } diff --git a/2022/35xxx/CVE-2022-35133.json b/2022/35xxx/CVE-2022-35133.json index 45a90f49421..5a701fb862c 100644 --- a/2022/35xxx/CVE-2022-35133.json +++ b/2022/35xxx/CVE-2022-35133.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in CherryTree v0.99.30 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name text field when creating a node." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://drive.google.com/file/d/1Pidkh2MAQkue81dS7SI-d16Vun_s5tot/view?usp=sharing", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1Pidkh2MAQkue81dS7SI-d16Vun_s5tot/view?usp=sharing" } ] } diff --git a/2022/35xxx/CVE-2022-35147.json b/2022/35xxx/CVE-2022-35147.json index 24cb73e92e8..ce76cc81f6a 100644 --- a/2022/35xxx/CVE-2022-35147.json +++ b/2022/35xxx/CVE-2022-35147.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35147", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35147", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DoraCMS v2.18 and earlier allows attackers to bypass login authentication via a crafted HTTP request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/doramart/DoraCMS/issues/256", + "refsource": "MISC", + "name": "https://github.com/doramart/DoraCMS/issues/256" } ] } diff --git a/2022/35xxx/CVE-2022-35148.json b/2022/35xxx/CVE-2022-35148.json index 548633297ca..dfa69513f31 100644 --- a/2022/35xxx/CVE-2022-35148.json +++ b/2022/35xxx/CVE-2022-35148.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-35148", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-35148", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "maccms10 v2021.1000.1081 to v2022.1000.3031 was discovered to contain a SQL injection vulnerability via the table parameter at database/columns.html." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/magicblack/maccms10/issues/931", + "refsource": "MISC", + "name": "https://github.com/magicblack/maccms10/issues/931" } ] }