René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

99 lines
3.5 KiB
JSON

{
"id": "CVE-2022-35582",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-13T22:15:09.130",
"lastModified": "2022-09-19T18:45:16.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control."
},
{
"lang": "es",
"value": "Penta Security Systems Inc WAPPLES versiones 4.0.*, 5.0.0.*, 5.0.12.* son vulnerables a un Control de Acceso Incorrecto. El sistema operativo en el que es ejecutado WAPPLES presenta incorporado un usuario no privilegiado penta con una contrase\u00f1a predefinida. La contrase\u00f1a de este usuario, as\u00ed como su existencia, no es divulgada en la documentaci\u00f3n. Conociendo las credenciales, los atacantes pueden usar esta caracter\u00edstica para conseguir un acceso no controlado al dispositivo, por lo que es considerada una posibilidad no documentada de control remoto"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentasecurity:wapples:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE796237-2504-4F54-9364-E1E6E7D18106"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentasecurity:wapples:5.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F701EA6A-95C0-45CC-9AF7-6FAC5393A7EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pentasecurity:wapples:5.0.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D0ECAB-927C-4EF5-A50E-0B978F63D11D"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.pentasecurity.com/product/wapples/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}