{ "id": "CVE-2022-1467", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-05-23T20:16:40.833", "lastModified": "2024-11-21T06:40:46.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows OS can be configured to overlay a \u201clanguage bar\u201d on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS." }, { "lang": "es", "value": "El Sistema Operativo Windows puede configurarse para superponer \"language bar\" sobre cualquier aplicaci\u00f3n. Cuando esta funcionalidad del SO est\u00e1 habilitada, la UI de la barra de lenguaje del SO ser\u00e1 visible en el navegador junto a las aplicaciones AVEVA InTouch Access Anywhere y Plant SCADA Access Anywhere. Es posible manipular la barra de lenguaje del SO de Windows para lanzar un prompt de comando del SO, resultando en un escape de contexto de la aplicaci\u00f3n al SO" } ], "metrics": { "cvssMetricV31": [ { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.1, "impactScore": 3.7 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.1, "impactScore": 6.0 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-668" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB1E4EE-1E6F-4B22-AE0F-F44D9713B148" }, { "vulnerable": true, "criteria": "cpe:2.3:a:aveva:plant_scada_access_anywhere:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F326293-9188-44E1-94C5-BBB87D91ED1D" } ] } ] } ], "references": [ { "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/", "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-05", "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-05", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ] } ] }