mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
210 lines
8.5 KiB
JSON
210 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2022-2513",
|
|
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
|
"published": "2022-11-22T11:15:29.027",
|
|
"lastModified": "2023-11-07T03:46:37.853",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy\u2019s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications such as\u00a0loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad en Intelligent Electronic Device (IED) Connectivity Package (ConnPack) la funci\u00f3n de almacenamiento de credenciales del producto PCM600 de Hitachi Energy incluido en las versiones que se enumeran a continuaci\u00f3n, donde las credenciales de los IED se almacenan en un formato de texto plano en la base de datos PCM600. Un atacante que logre acceder al archivo de copia de seguridad exportado puede explotar la vulnerabilidad y obtener las credenciales de los IED. Las credenciales se pueden utilizar para realizar modificaciones no autorizadas, como cargar configuraciones incorrectas, reiniciar los IED o provocar una Denegaci\u00f3n de Servicio (DoS) en los IED."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "cybersecurity@hitachienergy.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.5,
|
|
"impactScore": 4.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-312"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "cybersecurity@hitachienergy.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-312"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:650connectivitypackage:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "580D4B4A-12CF-4B8B-825E-DBEB1C3F2242"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E64BFE7A-5382-4F83-8E01-26EDAC92D9FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA0AA3CB-0E38-4569-9C64-87672ABBD162"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A2581EB-33EA-497E-A0E6-7D00D43B0EDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE0699BF-B243-4BF9-9163-72ACB3154D00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A585BC1-3980-4E79-9215-53412CD9E2B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2FDD877-410C-40F4-AD3C-C3755E9C1A9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32C0E59D-864E-4476-AFDF-22AE2B3E079F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF00C048-D36F-4DDB-9029-BFDA9AA5E43F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DF3A5A4-8406-46FC-8D30-23FC29B42150"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B215FF30-C19E-43C9-94FF-9AB8E91BB05D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98CBC435-9430-4CCD-84A5-E3A8765ED968"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.11",
|
|
"matchCriteriaId": "931A9615-9A1C-48BE-8C35-C758C688C557"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E2922A2-5025-4C34-9FFB-B82E176CEDE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC29C252-F7D0-4485-92D3-8E90CC52E3EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42ADEC08-1D34-48B4-B6EE-66E359F52F0C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "681A510D-AFA8-4DA2-B4CE-AA674E5B2366"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B19C14A3-2A6E-4AE0-93EF-2DB675E0271E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AFDBF53B-3246-405D-AEE0-6845C23E7013"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4157638-A8CA-4088-8B27-8BD9D65E6537"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58A1A1CE-CDD3-42E7-B4A8-C6D104930917"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch",
|
|
"source": "cybersecurity@hitachienergy.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |