René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

88 lines
2.3 KiB
JSON

{
"id": "CVE-2022-45600",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-22T22:15:11.933",
"lastModified": "2023-03-03T02:17:43.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:aztech:wmb250ac_firmware:016_2020:*:*:*:*:*:*:*",
"matchCriteriaId": "62EE4657-A1B2-434C-B63A-C82A93C461A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:aztech:wmb250ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E220D5F1-2C93-46A0-8BF3-05EB5BE266BA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ethancunt/CVE-2022-45600",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}