2024-12-08 03:06:42 +00:00

174 lines
5.6 KiB
JSON

{
"id": "CVE-2022-40628",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2022-09-23T16:15:11.853",
"lastModified": "2024-11-21T07:21:44.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper control of code generation in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary commands on the targeted device."
},
{
"lang": "es",
"value": "Esta vulnerabilidad se presenta en Tacitine Firewall, en todas las versiones de EN6200-PRIME QUAD-35 y EN6200-PRIME QUAD-100 entre 19.1.1 y 22.20.1 (incluy\u00e9ndola), debido a un control inapropiado de la generaci\u00f3n de c\u00f3digo en la interfaz de administraci\u00f3n basada en la web de Tacitine Firewall. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n http especialmente dise\u00f1ada en el dispositivo objetivo. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad podr\u00eda permitir a un atacante remoto no autenticado ejecutar comandos arbitrarios en el dispositivo objetivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tacitine:en6200-prime_quad-35_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.1.1",
"versionEndExcluding": "22.21.2",
"matchCriteriaId": "6E36CCE1-EE57-4509-A5EA-A661AB0D28BE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tacitine:en6200-prime_quad-35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83F89827-7182-4C0F-8AF9-F93FECCA4DEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tacitine:en6200-prime_quad-100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.1.1",
"versionEndExcluding": "22.21.2",
"matchCriteriaId": "4EDF36CA-FC59-4CB9-B562-5E6EB2102319"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tacitine:en6200-prime_quad-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2071D6CD-7708-46EC-9B09-F0BC9A1626C9"
}
]
}
]
}
],
"references": [
{
"url": "https://tacitine.com/newdownload/CVE-2022-40628.pdf",
"source": "vdisclose@cert-in.org.in",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363",
"source": "vdisclose@cert-in.org.in",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://tacitine.com/newdownload/CVE-2022-40628.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}