2024-12-15 03:03:56 +00:00

125 lines
4.0 KiB
JSON

{
"id": "CVE-2022-22722",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2022-02-04T23:15:13.067",
"lastModified": "2024-11-21T06:47:19.423",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)"
},
{
"lang": "es",
"value": "Una CWE-798: Se presenta un uso de credenciales embebidas que podr\u00eda resultar en una divulgaci\u00f3n de informaci\u00f3n. Si un atacante obtuviera la clave criptogr\u00e1fica SSH del dispositivo y tomara el control activo de la red operativa local conectada al producto, podr\u00eda observar y manipular el tr\u00e1fico asociado a la configuraci\u00f3n del producto. Producto afectado: Easergy P5 (todas las versiones de firmware anteriores a V01.401.101)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 5.4,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:easergy_p5_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "01.401.101",
"matchCriteriaId": "5F339D52-8956-44D7-B9A3-5E33CF93F014"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:easergy_p5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D642DB0E-55FF-430D-BD45-D305B13A5045"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03",
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}