mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
120 lines
4.1 KiB
JSON
120 lines
4.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@fidelissecurity.com",
|
|
"DATE_PUBLIC": "2022-05-16T15:30:00.000Z",
|
|
"ID": "CVE-2022-24390",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Authenticated Command Injection Vulnerability in Fidelis Network and Deception"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Fidelis Network",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "CentOS",
|
|
"version_affected": "<",
|
|
"version_name": "Fidelis Network",
|
|
"version_value": "9.4.5"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Fidelis Deception",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "CentOS",
|
|
"version_affected": "<",
|
|
"version_name": "Fidelis Deception",
|
|
"version_value": "9.4.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Fidelis Cybersecurity"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Ryan Wincey, Securifera"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Vulnerability in rconfig \u201cremote_text_file\u201d enables an attacker with user level access to the CLI to inject user level commands into Fidelis Network and Deception CommandPost, Collector, Sensor, and Sandbox components as well as neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability."
|
|
}
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Root level access"
|
|
}
|
|
],
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-78 OS Command Injection"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Apply patches or upgrade to latest version"
|
|
}
|
|
],
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |