2023-05-19 14:00:34 +00:00
{
"id" : "CVE-2022-30114" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-05-19T12:15:09.340" ,
2023-05-26 20:00:33 +00:00
"lastModified" : "2023-05-26T18:07:15.257" ,
"vulnStatus" : "Analyzed" ,
2023-05-19 14:00:34 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A heap-based buffer overflow in a network service in Fastweb FASTGate MediaAccess FGA2130FWB, firmware version 18.3.n.0482_FW_230_FGA2130, and DGA4131FWB, firmware version up to 18.3.n.0462_FW_261_DGA4131, allows a remote attacker to reboot the device through a crafted HTTP request, causing DoS."
}
] ,
2023-05-26 20:00:33 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fastweb:fastgate_vdsl2_dga4131fwb_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "18.3.n.0482_fw_264_dga4131" ,
"matchCriteriaId" : "94940174-3278-4418-816A-AD8CDA14326C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:fastweb:fastgate_vdsl2_dga4131fwb:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6608877-D165-49F2-B028-FE3AC7DDA705"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fastweb:fastgate_gpon_fga2130fwb_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "18.3.n.0482_fw_233_fga2130" ,
"matchCriteriaId" : "8DCABC6B-5F41-4E06-A360-7C2264812572"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:fastweb:fastgate_gpon_fga2130fwb:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A03406C0-71DB-43E1-822C-C4296C1B200B"
}
]
}
]
}
] ,
2023-05-19 14:00:34 +00:00
"references" : [
{
"url" : "http://fastgate.com" ,
2023-05-26 20:00:33 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-05-19 14:00:34 +00:00
} ,
{
"url" : "http://fastweb.com" ,
2023-05-26 20:00:33 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-05-19 14:00:34 +00:00
} ,
{
"url" : "https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/" ,
2023-05-26 20:00:33 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Technical Description" ,
"Third Party Advisory"
]
2023-05-19 14:00:34 +00:00
}
]
}