mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
106 lines
3.7 KiB
JSON
106 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2022-28866",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-10-12T00:15:10.047",
|
|
"lastModified": "2024-11-21T06:58:05.603",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple Improper Access Control was discovered in Nokia AirFrame BMC Web GUI < R18 Firmware v4.13.00. It does not properly validate requests for access to (or editing of) data and functionality in all endpoints under /#settings/* and /api/settings/*. By not verifying the permissions for access to resources, it allows a potential attacker to view pages, with sensitive data, that are not allowed, and modify system configurations also causing DoS, which should be accessed only by user with administration profile, bypassing all controls (without checking for user identity)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado un Control de Acceso Inapropiado m\u00faltiple en Nokia AirFrame BMC Web GUI versiones anteriores a R18 Firmware v4.13.00. No comprueba apropiadamente las peticiones de acceso a (o edici\u00f3n de) datos y funcionalidades en todos los endpoints bajo /#settings/* y /api/settings/*. Al no verificar los permisos de acceso a los recursos, permite a un potencial atacante visualizar p\u00e1ginas, con datos confidenciales, que no est\u00e1n permitidas, y modificar configuraciones del sistema causando tambi\u00e9n DoS, a las que s\u00f3lo deber\u00eda acceder el usuario con perfil de administraci\u00f3n, omitiendo todos los controles (sin comprobar la identidad del usuario)"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:nokia:airframe_bmc_web_gui_r18_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "4.13.00",
|
|
"matchCriteriaId": "F19E8BAE-DE0A-4045-B22F-B123FCDD6B10"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |