mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
240 lines
6.7 KiB
JSON
240 lines
6.7 KiB
JSON
{
|
|
"id": "CVE-2022-47208",
|
|
"sourceIdentifier": "vulnreport@tenable.com",
|
|
"published": "2022-12-16T20:15:08.860",
|
|
"lastModified": "2024-11-21T07:31:41.610",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The \u201cpuhttpsniff\u201d service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El servicio ?puhttpsniff?, que se ejecuta de forma predeterminada, es susceptible a la inyecci\u00f3n de comandos debido a una entrada de usuario mal sanitizada. Un atacante no autenticado en el mismo segmento de red que el router puede ejecutar comandos arbitrarios en el dispositivo sin autenticaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax1800_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "0B99D0FE-39ED-4211-9E9A-7D2E691E1BFC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax1800:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1DE3A065-960D-4C5C-94BC-213136A7F346"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax2400_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "BB05778B-B483-410D-B840-C3BBCABDDF21"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax2400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "268E1ED5-73FA-47D5-9E1E-7A7DDA6D2B67"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax3000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "75A82842-679A-4BE5-80DA-F765C9574CA9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax3000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E72EBF68-B0C1-4870-A53D-3BA183337706"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax5400_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "361AFE8C-CAA7-49EB-8D3E-6E40340CB9FC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax5400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BE92943-95C9-4B04-AD1F-656BEB6ED20E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax6000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "F80E127F-1374-4781-B4D6-720F4F48D8D4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax6000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18BDA466-4A39-4D20-A82A-FE3D2770F4FA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:nighthawk_ax11000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.9.90",
|
|
"matchCriteriaId": "5E19D5AB-C995-4155-8049-775BC8CF9051"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:nighthawk_ax11000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8F7CDAB-F102-4B24-9561-592C36708F1D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.tenable.com/security/research/tra-2022-37",
|
|
"source": "vulnreport@tenable.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.tenable.com/security/research/tra-2022-37",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |