146 lines
4.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-30262",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-17T15:15:08.260",
"lastModified": "2024-11-21T07:02:27.627",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks."
},
{
"lang": "es",
"value": "Las RTUs de Emerson ControlWave \"Next Generation\" versiones hasta 02-05-2022, manejan inapropiadamente la integridad del firmware. Utilizan el protocolo BSAP-IP para transmitir las actualizaciones de firmware. Las actualizaciones de firmware son suministradas como archivos CAB que contienen una imagen binaria de firmware. En todos los casos, se ha detectado que las im\u00e1genes de firmware no ten\u00edan autenticaci\u00f3n (en forma de firma de firmware) y s\u00f3lo eran basadas en sumas de comprobaci\u00f3n no seguras para las comprobaciones regulares de integridad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
2023-04-24 12:24:31 +02:00
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:controlwave_pac_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2022-05-02",
"matchCriteriaId": "E96BACEB-97DB-4BB2-8903-96CFDAEA37AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:controlwave_pac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70DA34F-5533-4704-AE11-F3065156CD23"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:controlwave_micro_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2022-05-02",
"matchCriteriaId": "1F7F1876-384B-4B3C-B384-45DB03609F48"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:controlwave_micro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC7C433-A42D-4FBA-9F79-F3923153ABF1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-02",
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.forescout.com/blog/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-02",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.forescout.com/blog/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}