2024-12-15 03:03:56 +00:00

148 lines
4.1 KiB
JSON

{
"id": "CVE-2022-3485",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-12-12T12:15:10.697",
"lastModified": "2024-11-21T07:19:37.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In IFM Moneo Appliance with version up to 1.9.3 an unauthenticated remote attacker can reset the administrator password by only supplying the serial number and thus gain full control of the device.\n"
},
{
"lang": "es",
"value": "En IFM Moneo Appliance con versi\u00f3n hasta 1.9.3, un atacante remoto no autenticado puede restablecer la contrase\u00f1a del administrador proporcionando \u00fanicamente el n\u00famero de serie y as\u00ed obtener el control total del dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ifm:moneo_qha210_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.9.3",
"matchCriteriaId": "D026E52C-4E13-4D47-B723-A819A95FF4B5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ifm:moneo_qha210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CEB61EB-5EB4-4954-9D25-68E1FF181EB6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ifm:moneo_qha200_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.9.3",
"matchCriteriaId": "9759E1AE-E126-4DB9-A7B6-709DFAB72001"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ifm:moneo_qha200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7370B2B8-65E3-43C9-9C79-208EE01CDB3D"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-050/",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-050/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}