René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

155 lines
4.2 KiB
JSON

{
"id": "CVE-2022-38789",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-15T12:15:09.617",
"lastModified": "2022-09-20T14:20:49.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference."
},
{
"lang": "es",
"value": "Se ha detectado un problema en Airties Smart Wi-Fi versiones anteriores a 04-08-2020. Permite a atacantes cambiar el SSID principal/de invitados y el PSK a valores arbitrarios, y mapear la LAN, debido a una Referencia Directa de Objetos Insegura"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:airties:air_4920_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020-08-04",
"matchCriteriaId": "B7500A67-4355-411F-B025-E4263DA0B95C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:airties:air_4920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "464536CF-3B75-4708-A0A7-BF243BE7BE98"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:airties:air_4921_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020-08-04",
"matchCriteriaId": "CFFB8EF2-CBBC-489C-ABE8-D3E2FA6E01F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:airties:air_4921:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E88CA2C5-D8B8-4751-88DA-F713A34E7D0E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:airties:air_4971_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020-08-04",
"matchCriteriaId": "66FCB5C5-729C-492F-BF8F-290DCEDDABAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:airties:air_4971:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06225783-E00A-4F9F-82A5-3EDFFE31A1D5"
}
]
}
]
}
],
"references": [
{
"url": "https://airties.com/airties-information-security-policy/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}