René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

108 lines
3.3 KiB
JSON

{
"id": "CVE-2022-44037",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:11.027",
"lastModified": "2022-12-06T15:37:07.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An access control issue in APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights without authenticating allows him to perform multiple attacks, such as attacking wireless network in the product's range."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apsystems:ecu-c_firmware:c1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFF1FF3-D5F3-4868-AC83-370AB5FF3A81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apsystems:ecu-c_firmware:v3.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF2AA5A-DB33-4676-8952-986E0E27B2E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apsystems:ecu-c_firmware:v4.1na:*:*:*:*:*:*:*",
"matchCriteriaId": "7151F8C2-2D1F-4748-9A32-E48A6563BC45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apsystems:ecu-c_firmware:v4.1saa:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9C96-631A-4E64-BDE9-F89610EFABBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apsystems:ecu-c_firmware:w2.1na:*:*:*:*:*:*:*",
"matchCriteriaId": "781E686D-5409-40C4-A350-550B0D8C3AF0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:apsystems:ecu-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "285ADFEF-682C-4B96-BF16-088443FB9E49"
}
]
}
]
}
],
"references": [
{
"url": "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}