René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

144 lines
4.5 KiB
JSON

{
"id": "CVE-2022-30277",
"sourceIdentifier": "cybersecurity@bd.com",
"published": "2022-06-02T14:15:51.850",
"lastModified": "2022-06-10T02:14:46.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BD Synapsys\u2122, versions 4.20, 4.20 SR1, and 4.30, contain an insufficient session expiration vulnerability. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII)."
},
{
"lang": "es",
"value": "BD Synapsys\u2122, versiones 4.20, 4.20 SR1, y 4.30, contienen una vulnerabilidad de expiraci\u00f3n de sesi\u00f3n insuficiente. Si es explotada, los actores de la amenaza pueden ser capaces de acceder, modificar o eliminar informaci\u00f3n confidencial, incluyendo informaci\u00f3n de salud electr\u00f3nica protegida (ePHI), informaci\u00f3n de salud protegida (PHI) e informaci\u00f3n de identificaci\u00f3n personal (PII)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2
},
{
"source": "cybersecurity@bd.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.6
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
},
{
"source": "cybersecurity@bd.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bd:synapsys:4.20:-:*:*:*:*:*:*",
"matchCriteriaId": "29718815-1C5E-4C2E-AB8E-95CC357DB0AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bd:synapsys:4.20:sr1:*:*:*:*:*:*",
"matchCriteriaId": "ECEB919F-91F6-4ABF-8685-5C6385F96572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bd:synapsys:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "B44B121C-256E-4E6D-8462-B37DFA60584C"
}
]
}
]
}
],
"references": [
{
"url": "https://cybersecurity.bd.com/bulletins-and-patches/bd-synapsys-insufficient-session-expiration",
"source": "cybersecurity@bd.com",
"tags": [
"Vendor Advisory"
]
}
]
}