mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
123 lines
4.8 KiB
JSON
123 lines
4.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "productsecurity@baxter.com",
|
|
"DATE_PUBLIC": "2022-09-08T22:03:00.000Z",
|
|
"ID": "CVE-2022-26392",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Format String vulnerability"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Baxter Spectrum Wireless Battery Module (WBM)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "16",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "16D38",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "17",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "17D19",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "20D29",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "20D30",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "20D31",
|
|
"version_value": " "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_name": "20D32",
|
|
"version_value": " "
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Baxter"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Baxter Spectrum WBM (v16, v16D38) and Baxter Spectrum WBM (v17, v17D19, v20D29 to v20D32) when in superuser mode is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.1,
|
|
"baseSeverity": "LOW",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-134 Use of Externally-Controlled Format String"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx",
|
|
"name": "https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |