René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

232 lines
6.2 KiB
JSON

{
"id": "CVE-2022-29730",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-02T14:15:50.827",
"lastModified": "2022-06-10T14:15:18.630",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device."
},
{
"lang": "es",
"value": "Se ha detectado que USR IOT 4G LTE Industrial Cellular VPN Router versi\u00f3n v1.0.36, contiene credenciales embebidas para su cuenta con altos privilegios. Las credenciales no pueden ser alteradas mediante el funcionamiento normal del dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:usr:usr-g808_firmware:1.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "7E946659-3111-4135-AE90-5ADF3D3D4054"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:usr:usr-g808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9804B3-C0EE-446F-BD01-EB5C4274987F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:usr:usr-g807_firmware:1.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "7A95D603-40C5-49FE-8799-5659FECE484B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:usr:usr-g807:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97EBE7AA-CB8B-453A-9F04-B3978379E96D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:usr:usr-g806_firmware:1.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FD74A5AB-4B53-4CF0-961A-5BCF61710E22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:usr:usr-g806:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C56BCFF2-3F02-4DB6-9DC1-575C7E6A7E77"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:usr:usr-g800v2_firmware:1.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "80410C48-C017-4139-933A-45B495952550"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:usr:usr-g800v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1861FD4-AB43-44CD-A79B-3CD0B3D52C37"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:usr:usr-lg220-l_firmware:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB23F5C-0C80-4068-976D-9B36A61A5E47"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:usr:usr-lg220-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "172C94BB-112C-4AB9-A7C4-F766993F839E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.pusr.com/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}