From b6dca2fe2a8ccabdfc509e5f8b8aa906bb0af78f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 28 Jun 2022 14:01:10 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/23xxx/CVE-2022-23763.json | 81 +++++++++++++++++++++++++++++++--- 2022/30xxx/CVE-2022-30562.json | 50 +++++++++++++++++++-- 2022/30xxx/CVE-2022-30563.json | 50 +++++++++++++++++++-- 3 files changed, 169 insertions(+), 12 deletions(-) diff --git a/2022/23xxx/CVE-2022-23763.json b/2022/23xxx/CVE-2022-23763.json index 3d008338d70..00a73976d52 100644 --- a/2022/23xxx/CVE-2022-23763.json +++ b/2022/23xxx/CVE-2022-23763.json @@ -1,18 +1,87 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "vuln@krcert.or.kr", "ID": "CVE-2022-23763", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "DOUZONE BIZON NeoRS file download and execute vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "NeoRS", + "version": { + "version_data": [ + { + "platform": "Windows", + "version_affected": "<=", + "version_value": "2021.3.10.1" + } + ] + } + } + ] + }, + "vendor_name": "DOUZONE BIZON Co.,Ltd" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Origin validation error vulnerability in NeoRS\u2019s ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-346 Origin Validation Error" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788", + "name": "https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30562.json b/2022/30xxx/CVE-2022-30562.json index 41f036e4621..225a0aa7c0c 100644 --- a/2022/30xxx/CVE-2022-30562.json +++ b/2022/30xxx/CVE-2022-30562.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-30562", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@dahuatech.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "IPCHDBW2XXX IPCHFW2XXX ASI7XXXX", + "version": { + "version_data": [ + { + "version_value": "Versions which Build time before April, 2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "URL Redirection to Untrusted Site ('Open Redirect')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.dahuasecurity.com/support/cybersecurity/details/1017", + "url": "https://www.dahuasecurity.com/support/cybersecurity/details/1017" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "If the user enables the https function on the device, an attacker can modify the user\u2019s request data packet through a man-in-the-middle attack ,Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page." } ] } diff --git a/2022/30xxx/CVE-2022-30563.json b/2022/30xxx/CVE-2022-30563.json index affc026b578..ce7956379bf 100644 --- a/2022/30xxx/CVE-2022-30563.json +++ b/2022/30xxx/CVE-2022-30563.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-30563", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@dahuatech.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "IPCHDBW2XXX[IPCHFW2XXX[ASI7XXXX", + "version": { + "version_data": [ + { + "version_value": "Versions which Build time before April, 2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Replay Attacks" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.dahuasecurity.com/support/cybersecurity/details/1017", + "url": "https://www.dahuasecurity.com/support/cybersecurity/details/1017" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet." } ] }