source-url
stringlengths
62
64
Prompt
stringlengths
762
25.3k
Correct Answer
stringlengths
74
7.83k
vulnerability-overview
stringlengths
186
24.7k
https://www.cisa.gov/news-events/ics-advisories/icsa-21-194-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 There is a DHCP vulnerability in Wind River VxWorks, for versions prior to 6.5. This vulnerability could cause a heap overflow if exploited. CVE-2021-29998 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to cause a heap-based buffer overflow.
3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 There is a DHCP vulnerability in Wind River VxWorks, for versions prior to 6.5. This vulnerability could cause a heap overflow if exploited. CVE-2021-29998 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected system cannot properly process specially crafted packets sent to Port 8888/TCP. A remote attacker could exploit this vulnerability to cause a denial-of-service condition. The affected devices must be restarted manually. CVE-2022-27194 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an unauthenticated attacker to cause a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected system cannot properly process specially crafted packets sent to Port 8888/TCP. A remote attacker could exploit this vulnerability to cause a denial-of-service condition. The affected devices must be restarted manually. CVE-2022-27194 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-19-085-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 EXPECTED BEHAVIOR VIOLATION CWE-440 The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port and into the mirrored network. An attacker could exploit this vulnerability to transmit malicious packets to systems in the mirrored network to influence their configuration and runtime behavior. This vulnerability could be exploited by an attacker with network access to the traffic-receiving network. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the confidentiality and availability of the traffic-generating network. CVE-2019-6569 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L).
Successful exploitation of this vulnerability could allow an attacker to feed data over a mirror port and into the mirrored network.
4.2.1 EXPECTED BEHAVIOR VIOLATION CWE-440 The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port and into the mirrored network. An attacker could exploit this vulnerability to transmit malicious packets to systems in the mirrored network to influence their configuration and runtime behavior. This vulnerability could be exploited by an attacker with network access to the traffic-receiving network. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the confidentiality and availability of the traffic-generating network. CVE-2019-6569 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 OPERATION ON A RESOURCE AFTER EXPIRATION OR RELEASE CWE-672 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37185 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 OPERATION ON A RESOURCE AFTER EXPIRATION OR RELEASE CWE-672 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37204 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.3 MISSING RELEASE OF MEMORY AFTER EFFECTIVE LIFETIME CWE-401 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37205 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to cause a denial-of-service condition.
4.2.1 OPERATION ON A RESOURCE AFTER EXPIRATION OR RELEASE CWE-672 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37185 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 OPERATION ON A RESOURCE AFTER EXPIRATION OR RELEASE CWE-672 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37204 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.3 MISSING RELEASE OF MEMORY AFTER EFFECTIVE LIFETIME CWE-401 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations. CVE-2021-37205 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-17
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INCORRECT IMPLEMENTATION OF AUTHENTICATION ALGORITHM CWE-303 The affected applications do not properly validate login information during authentication. This could lead to denial-of-service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials. CVE-2022-33736 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow unauthenticated access to the application or cause denial of service condition for existing users.
3.2.1 INCORRECT IMPLEMENTATION OF AUTHENTICATION ALGORITHM CWE-303 The affected applications do not properly validate login information during authentication. This could lead to denial-of-service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials. CVE-2022-33736 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 Affected applications contain a vulnerability where parsing specially crafted HTTP packets may cause memory corruption. CVE-2022-30938 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to crash the affected application leading to a denial-of-service condition.
3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 Affected applications contain a vulnerability where parsing specially crafted HTTP packets may cause memory corruption. CVE-2022-30938 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected systems do not properly validate inputs that are sent to the underlying message passing framework. This could allow a remote attacker to trigger a denial of service of the affected system. CVE-2021-44221 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The underlying MQTT service of affected systems does not perform authentication in the default configuration. This could allow an unauthenticated remote attacker to send arbitrary messages to the service and thereby issue arbitrary requests in the affected system. CVE-2021-44222 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to send arbitrary messages within the affected system or to crash attached applications.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected systems do not properly validate inputs that are sent to the underlying message passing framework. This could allow a remote attacker to trigger a denial of service of the affected system. CVE-2021-44221 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The underlying MQTT service of affected systems does not perform authentication in the default configuration. This could allow an unauthenticated remote attacker to send arbitrary messages to the service and thereby issue arbitrary requests in the affected system. CVE-2021-44222 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 In case of access to an active user session of a Mendix application built with an affected version, its possible to change a users password via bypassing password validations. This could allow an attacker to set weak passwords. CVE-2022-31257 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
Successful exploitation of this vulnerability could allow an attacker to change the users password bypassing password validations within a Mendix application.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 In case of access to an active user session of a Mendix application built with an affected version, its possible to change a users password via bypassing password validations. This could allow an attacker to set weak passwords. CVE-2022-31257 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74 An expression injection vulnerability was discovered in the Workflow subsystem of Mendix Runtime that can affect the running applications. The vulnerability could allow a malicious user to leak sensitive information in a certain configuration. CVE-2022-34466 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow a malicious user to leak sensitive information if the Workflow visual language of Mendix is used.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74 An expression injection vulnerability was discovered in the Workflow subsystem of Mendix Runtime that can affect the running applications. The vulnerability could allow a malicious user to leak sensitive information in a certain configuration. CVE-2022-34466 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF RECURSIVE ENTITY REFERENCES IN DTDS (XML ENTITY EXPANSION) CWE-776 The affected component is vulnerable to XML entity expansion injection. An attacker may use this to compromise the availability of the affected component. CVE-2022-34467 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to compromise the availability of the affected component.
3.2.1 IMPROPER RESTRICTION OF RECURSIVE ENTITY REFERENCES IN DTDS (XML ENTITY EXPANSION) CWE-776 The affected component is vulnerable to XML entity expansion injection. An attacker may use this to compromise the availability of the affected component. CVE-2022-34467 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 Affected devices do not properly validate user input, making them susceptible to command injection. An attacker with access to either the shell or the web CLI with administrator privileges could access the underlying operating system as the root user. CVE-2022-29560 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker with administrative privileges to gain root access.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 Affected devices do not properly validate user input, making them susceptible to command injection. An attacker with access to either the shell or the web CLI with administrator privileges could access the underlying operating system as the root user. CVE-2022-29560 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENT SESSION EXPIRATION CWE-613 The web session management of affected devices does not invalidate session IDs in certain logout scenarios. This could allow an authenticated remote attacker to hijack other users sessions. CVE-2022-33137 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Affected devices do not perform authentication for several web API endpoints. This could allow an unauthenticated remote attacker to read and download data from the device. CVE-2022-33138 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow attackers to hijack other users web-based management sessions or access data on the device without prior authentication.
3.2.1 INSUFFICIENT SESSION EXPIRATION CWE-613 The web session management of affected devices does not invalidate session IDs in certain logout scenarios. This could allow an authenticated remote attacker to hijack other users sessions. CVE-2022-33137 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Affected devices do not perform authentication for several web API endpoints. This could allow an unauthenticated remote attacker to read and download data from the device. CVE-2022-33138 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The webserver of affected devices calculates session IDs and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute force session IDs and hijack existing sessions. CVE-2022-26647 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. CVE-2022-26648 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H) 3.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices. CVE-2022-26649 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities may allow an attacker to reboot, cause denial-of-service conditions, or impact the system by other means through a buffer overflow.
3.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The webserver of affected devices calculates session IDs and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute force session IDs and hijack existing sessions. CVE-2022-26647 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. CVE-2022-26648 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H) 3.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices. CVE-2022-26649 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to rendering of .DWG files after they are opened in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28807 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to reading .DWG files in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28808 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to reading .DWG files with invalid vertex number in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28809 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow a user to open a malicious DWG file that could lead to the application crashing or to an arbitrary code execution.
3.2.1 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to rendering of .DWG files after they are opened in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28807 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to reading .DWG files in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28808 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK is vulnerable to an out-of-bounds read due to reading .DWG files with invalid vertex number in the recovery mode. This allows an attacker to execute code in the context of the current process. CVE-2022-28809 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING RELEASE OF RESOURCE AFTER EFFECTIVE LIFETIME CWE-772 The affected product is vulnerable when using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial-of-service condition. CVE-2022-29884 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could crash the device being accessed; a buffer overflow condition may allow remote code execution.
3.2.1 MISSING RELEASE OF RESOURCE AFTER EFFECTIVE LIFETIME CWE-772 The affected product is vulnerable when using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial-of-service condition. CVE-2022-29884 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-055-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to this product, they could observe and manipulate traffic associated with product configuration. This could result in information disclosure. CVE-2022-22722 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSSIC BUFFER OVERFLOW') CWE-120 A buffer copy without checking size of input vulnerability exists in Easergy P5 devices that could lead to a buffer overflow, causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping functions via GOOSE can be impacted. CVE-2022-22723 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSSIC BUFFER OVERFLOW') CWE-120 A buffer copy without checking size of input vulnerability exists in Easergy P3 devices that could lead to a buffer overflow, causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping functions via GOOSE can be impacted. CVE-2022-22725 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update A Part 3 of 4 --------- 4.2.4 IMPROPER INPUT VALIDATION CWE-20 An Improper Input Validation vulnerability exists in Easergy P5 devices that cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. CVE-2022-34758 has been assigned to this vulnerability. A CVSS v3 base score of 5.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L). --------- End Update A Part 3 of 4 ---------
Successful exploitation of these vulnerabilities may disclose device credentials, cause a denial-of-service condition, device reboot, or allow an attacker to gain full control of the relay. This could result in loss of protection to your electrical network.
4.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to this product, they could observe and manipulate traffic associated with product configuration. This could result in information disclosure. CVE-2022-22722 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSSIC BUFFER OVERFLOW') CWE-120 A buffer copy without checking size of input vulnerability exists in Easergy P5 devices that could lead to a buffer overflow, causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping functions via GOOSE can be impacted. CVE-2022-22723 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSSIC BUFFER OVERFLOW') CWE-120 A buffer copy without checking size of input vulnerability exists in Easergy P3 devices that could lead to a buffer overflow, causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping functions via GOOSE can be impacted. CVE-2022-22725 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update A Part 3 of 4 --------- 4.2.4 IMPROPER INPUT VALIDATION CWE-20 An Improper Input Validation vulnerability exists in Easergy P5 devices that cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. CVE-2022-34758 has been assigned to this vulnerability. A CVSS v3 base score of 5.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L). --------- End Update A Part 3 of 4 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-22-188-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product has credentials for the maintenance interface hardcoded in the firmware. The maintenance interface allows for debug and process execution capabilities, which could allow remote code execution or cause a denial-of-service condition. CVE-2022-29953 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product uses protocols to provide configuration management and historical data related functionality without any authentication features, which may allow an attacker to read or write files on the controllers or cause a denial-of-service condition. CVE-2022-29952 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of these vulnerabilities could allow file manipulation, remote code execution, or cause a denial-of-service condition.
3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product has credentials for the maintenance interface hardcoded in the firmware. The maintenance interface allows for debug and process execution capabilities, which could allow remote code execution or cause a denial-of-service condition. CVE-2022-29953 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product uses protocols to provide configuration management and historical data related functionality without any authentication features, which may allow an attacker to read or write files on the controllers or cause a denial-of-service condition. CVE-2022-29952 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-188-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES CWE-1021 The X-Frame-Options header is not configured in the HTTP response, which could allow clickjacking attacks. CVE-2022-2179 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow a malicious user to trick a legitimate user into using an untrusted website. If exploited, this vulnerability could lead to a loss of sensitive information, such as authentication credentials.
3.2.1 IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES CWE-1021 The X-Frame-Options header is not configured in the HTTP response, which could allow clickjacking attacks. CVE-2022-2179 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-280-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The potential for a denial-of-service condition exists in MELSEC iQ-R series C Controller Module due to uncontrolled resource consumption caused by an attacker sending a large number of packets to the module at start up in a short time. CVE-2021-20600 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could prevent the module from starting up. If successfully exploited, a system reset would be required for recovery.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The potential for a denial-of-service condition exists in MELSEC iQ-R series C Controller Module due to uncontrolled resource consumption caused by an attacker sending a large number of packets to the module at start up in a short time. CVE-2021-20600 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-15-258-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to multiple heap-based buffer overflow vulnerabilities that may allow remote code execution. CVE-2015-6460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Successful exploitation of this vulnerability could cause a buffer overflow condition that may allow remote code execution.
4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to multiple heap-based buffer overflow vulnerabilities that may allow remote code execution. CVE-2015-6460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-181-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A user with administrative privileges in WebHMI can store a script that could impact other logged in users. CVE-2022-2254 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A user with administrative privileges in WebHMI may send OS commands to execute on the host server. CVE-2022-2253 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow a user with administrative privileges in WebHMI to execute arbitrary OS commands or impact other logged in users.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A user with administrative privileges in WebHMI can store a script that could impact other logged in users. CVE-2022-2254 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A user with administrative privileges in WebHMI may send OS commands to execute on the host server. CVE-2022-2253 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-181-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 If a WAC Router is subjected to a denial-of-service attack with malformed packets, the functions provided by the WAC Router may stop. CVE-2022-32284 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could cause the functions provided by the WAC Router to stop.
3.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 If a WAC Router is subjected to a denial-of-service attack with malformed packets, the functions provided by the WAC Router may stop. CVE-2022-32284 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-181-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER AUTHENTICATION CWE-287 By using a specific credential string, an attacker with network access to the devices web interface could circumvent the authentication scheme and perform administrative operations. CVE-2022-2197 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker with network access to bypass authentication and perform administrative operations.
3.2.1 IMPROPER AUTHENTICATION CWE-287 By using a specific credential string, an attacker with network access to the devices web interface could circumvent the authentication scheme and perform administrative operations. CVE-2022-2197 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-181-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Several protocols, including Firmware upgrade, Plug-and-Play, Hawk services, Management, SIS communications, and multi-cast have no authentication. This could allow an attacker who has reverse-engineered communications to invoke desired functionality or cause a denial-of-service condition. CVE-2022-29957 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable by using hard-coded credentials in the FTP service, which is disabled by default. CVE-2022-29962 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L). 3.2.3 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable to hard-coded credential use within the read-only Telnet service. CVE-2022-29963 has been assigned to this vulnerability. A CVSS v3 base score of 1.8 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N). 3.2.4 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable to hard-coded credential use within the SSH service, which is disabled by default. CVE-2022-29964 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L). 3.2.5 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 Firmware images are not signed and rely on insecure checksums for regular integrity checks. This could allow an attacker to push malicious firmware images, execute code, or cause a denial-of-service condition. CVE-2022-30260 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.6 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Access to privileged operations in the maintenance interface is controlled by a challenge-response authentication that uses a deterministic insecure algorithm. CVE-2022-29965 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities can result in a denial-of-service condition, manipulation of runtime communications, or compromise of a controller.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Several protocols, including Firmware upgrade, Plug-and-Play, Hawk services, Management, SIS communications, and multi-cast have no authentication. This could allow an attacker who has reverse-engineered communications to invoke desired functionality or cause a denial-of-service condition. CVE-2022-29957 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable by using hard-coded credentials in the FTP service, which is disabled by default. CVE-2022-29962 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L). 3.2.3 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable to hard-coded credential use within the read-only Telnet service. CVE-2022-29963 has been assigned to this vulnerability. A CVSS v3 base score of 1.8 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N). 3.2.4 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product is vulnerable to hard-coded credential use within the SSH service, which is disabled by default. CVE-2022-29964 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L). 3.2.5 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 Firmware images are not signed and rely on insecure checksums for regular integrity checks. This could allow an attacker to push malicious firmware images, execute code, or cause a denial-of-service condition. CVE-2022-30260 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.6 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Access to privileged operations in the maintenance interface is controlled by a challenge-response authentication that uses a deterministic insecure algorithm. CVE-2022-29965 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 The affected product ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no such file yet exists. As such, this hard-coded key is likely to be used by default. This could allow an attacker to remotely execute code, manipulate configuration, or cause a denial-of-service condition. CVE-2022-30271 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product SSH service is controlled by five preconfigured accounts, all of which come with default hard-coded credentials. This could allow an attacker to manipulate configuration, remotely execute code, and cause a denial-of-service condition. CVE-2022-30270 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 The affected device communicates with an XRT Lan-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the tiny encryption algorithm (TEA) in ECB mode using a hardcoded key, which could allow an attacker to manipulate the device configuration. CVE-2022-30274 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). 3.2.4 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product allows for custom application installation via STS software, the C toolkit, or the ACE1000 Easy Configurator. Application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. This could allow an authenticated attacker to run remote code execution or cause a denial-of-service condition. CVE-2022-30269 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 3.2.5 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 An attacker capable of communicating with and authenticating to a Motorola ACE1000 RTU via SSH or Web UI could push malicious firmware images to the RTU, which could allow firmware manipulation, remote code execution, and a denial-of-service condition. CVE-2022-30272 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to manipulate the RTU configuration, cause a denial-of-service condition, or achieve remote code execution.
3.2.1 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 The affected product ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no such file yet exists. As such, this hard-coded key is likely to be used by default. This could allow an attacker to remotely execute code, manipulate configuration, or cause a denial-of-service condition. CVE-2022-30271 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product SSH service is controlled by five preconfigured accounts, all of which come with default hard-coded credentials. This could allow an attacker to manipulate configuration, remotely execute code, and cause a denial-of-service condition. CVE-2022-30270 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 The affected device communicates with an XRT Lan-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the tiny encryption algorithm (TEA) in ECB mode using a hardcoded key, which could allow an attacker to manipulate the device configuration. CVE-2022-30274 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). 3.2.4 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product allows for custom application installation via STS software, the C toolkit, or the ACE1000 Easy Configurator. Application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. This could allow an authenticated attacker to run remote code execution or cause a denial-of-service condition. CVE-2022-30269 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 3.2.5 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 An attacker capable of communicating with and authenticating to a Motorola ACE1000 RTU via SSH or Web UI could push malicious firmware images to the RTU, which could allow firmware manipulation, remote code execution, and a denial-of-service condition. CVE-2022-30272 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The MDLC protocol has a legacy encryption mode that encrypts traffic using the tiny encryption algorithm (TEA) block-cipher in ECB mode, which offers no message integrity and reduced confidentiality. An attacker could craft messages with ciphertext blocks inserted at certain positions resulting in known plaintext at a given offset. This could either lead to message manipulation or exposure of the attack surface of the MDLC protocol parser to memory corruption attacks. CVE-2022-30273 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N). 3.2.2 PLAINTEXT STORAGE OF A PASSWORD CWE-256 The affected product utilizes an MDLC driver that has a password stored in plaintext in the wmdlcdrv.ini driver configuration file. CVE-2022-30275 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could result in message manipulation, exposure of the attack surface of the MDLC protocol parser, memory corruption, and exposure of sensitive information.
3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The MDLC protocol has a legacy encryption mode that encrypts traffic using the tiny encryption algorithm (TEA) block-cipher in ECB mode, which offers no message integrity and reduced confidentiality. An attacker could craft messages with ciphertext blocks inserted at certain positions resulting in known plaintext at a given offset. This could either lead to message manipulation or exposure of the attack surface of the MDLC protocol parser to memory corruption attacks. CVE-2022-30273 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N). 3.2.2 PLAINTEXT STORAGE OF A PASSWORD CWE-256 The affected product utilizes an MDLC driver that has a password stored in plaintext in the wmdlcdrv.ini driver configuration file. CVE-2022-30275 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The product lacks authentication features, which could allow any attacker capable of communicating with the port in question to invoke a variety of engineer actions, such as manipulation of RTU configurations or logic/applications. CVE-2022-30276 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Successful exploitation of this vulnerability could result in manipulation of device configuration.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The product lacks authentication features, which could allow any attacker capable of communicating with the port in question to invoke a variety of engineer actions, such as manipulation of RTU configurations or logic/applications. CVE-2022-30276 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information. CVE-2022-2135 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to multiple SQL injections that require low privileges for exploitation and may allow an unauthorized attacker to disclose information. CVE-2022-2136 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to two SQL injections that require high privileges for exploitation and may allow an unauthorized attacker to disclose information. CVE-2022-2137 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 3.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to a SQL injection with high attack complexity, which may allow an unauthorized attacker to disclose information. CVE-2022-2142 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product is vulnerable due to missing authentication, which may allow an attacker to read or modify sensitive data and execute arbitrary code, resulting in a denial-of-service condition. CVE-2022-2138 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). 3.2.6 RELATIVE PATH TRAVERSAL CWE-23 The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code. CVE-2022-2139 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 3.2.7 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code. CVE-2022-2143 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to read or modify sensitive data, disclose information, or execute arbitrary code.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information. CVE-2022-2135 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to multiple SQL injections that require low privileges for exploitation and may allow an unauthorized attacker to disclose information. CVE-2022-2136 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to two SQL injections that require high privileges for exploitation and may allow an unauthorized attacker to disclose information. CVE-2022-2137 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 3.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product is vulnerable to a SQL injection with high attack complexity, which may allow an unauthorized attacker to disclose information. CVE-2022-2142 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product is vulnerable due to missing authentication, which may allow an attacker to read or modify sensitive data and execute arbitrary code, resulting in a denial-of-service condition. CVE-2022-2138 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). 3.2.6 RELATIVE PATH TRAVERSAL CWE-23 The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code. CVE-2022-2139 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 3.2.7 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code. CVE-2022-2143 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Omron SYSMAC CS1/CJ1/CP1/CP2 series is vulnerable to a password used to restrict engineering operation is transmitted in plaintext. CVE-2022-31204 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.2 PLAINTEXT STORAGE OF A PASSWORD CWE-256 The CP1W-CIF41 Ethernet Option Board is vulnerable to a Web UI password that can be read from memory using the Omron FINS protocol. An attacker obtaining this password could change the network settings of the option board. CVE-2022-31205 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.3 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The logic that is downloaded to the PLC is not cryptographically authenticated, allowing an attacker to manipulate transmitted object code to an unprotected PLC without using the PLC protection password. An attacker could then execute arbitrary object code commands on the defined software logic for all versions of SYSMAC CS/CJ/CP series controllers and cause a denial-of-service condition. CVE-2022-31207 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). 3.2.4 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-347 The logic that is downloaded to the PLC is not cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module for SYSMAC NJ/NX series controllers. CVE-2022-31206 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N).
Successful exploitation of these vulnerabilities could cause a denial-of-service condition and allow remote code execution.
3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Omron SYSMAC CS1/CJ1/CP1/CP2 series is vulnerable to a password used to restrict engineering operation is transmitted in plaintext. CVE-2022-31204 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.2 PLAINTEXT STORAGE OF A PASSWORD CWE-256 The CP1W-CIF41 Ethernet Option Board is vulnerable to a Web UI password that can be read from memory using the Omron FINS protocol. An attacker obtaining this password could change the network settings of the option board. CVE-2022-31205 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.3 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The logic that is downloaded to the PLC is not cryptographically authenticated, allowing an attacker to manipulate transmitted object code to an unprotected PLC without using the PLC protection password. An attacker could then execute arbitrary object code commands on the defined software logic for all versions of SYSMAC CS/CJ/CP series controllers and cause a denial-of-service condition. CVE-2022-31207 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). 3.2.4 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-347 The logic that is downloaded to the PLC is not cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module for SYSMAC NJ/NX series controllers. CVE-2022-31206 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-174-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected products are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to send a specially crafted packet that may result in a denial-of-service condition. CVE-2022-1737 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker with access to the EtherNet/IP network to send a specially crafted packet that may result in a denial-of-service condition.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected products are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to send a specially crafted packet that may result in a denial-of-service condition. CVE-2022-1737 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-174-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a root user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters. CVE-2022-2105 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.2 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script. CVE-2022-1667 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed. CVE-2022-2102 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.4 WEAK PASSWORD REQUIREMENTS CWE-521 Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH. CVE-2022-1668 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 IMPROPER ACCESS CONTROL CWE-284 An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories. CVE-2022-2103 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash). CVE-2022-2104 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 3.2.7 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 The default password for the web applications root user (the vendors private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool. CVE-2022-1666 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to obtain full, root access over the device in multiple ways. Initial footholds through S-Web interface software vulnerabilities could allow an attacker to obtain a level of control over the PLC's functions only the vendor typically has access to. This includes the ability to reset the PLC, upload arbitrary files / execute code, and change parameters for protective functions that can pose a range of availability and safety risks to the power system the PLC is configured to control (based on the specific implementation). Further exploitation of the underlying PLC misconfigurations can allow an attacker to trivially escalate privileges to OS root through either the S-Web vulnerabilities or FTP and SSH misconfigurations.
3.2.1 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a root user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters. CVE-2022-2105 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.2 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script. CVE-2022-1667 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 IMPROPER ENFORCEMENT OF BEHAVIORAL WORKFLOW CWE-841 Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed. CVE-2022-2102 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.4 WEAK PASSWORD REQUIREMENTS CWE-521 Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH. CVE-2022-1668 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 IMPROPER ACCESS CONTROL CWE-284 An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories. CVE-2022-2103 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash). CVE-2022-2104 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 3.2.7 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 The default password for the web applications root user (the vendors private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool. CVE-2022-1666 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-174-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected product transmits sensitive information in cleartext, which may allow an attacker sniffing network traffic on the controller to read/change configuration settings or update the controller with tampered firmware. CVE-2022-29519 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product uses hard-coded credentials, which could enable an attacker to read/change configuration settings or update the controller with tampered firmware. Note, single CPU modules of the FCN/FCJ controller are unaffected. CVE-2022-30997 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow attackers to alter device configuration settings and tamper with device firmware.
3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected product transmits sensitive information in cleartext, which may allow an attacker sniffing network traffic on the controller to read/change configuration settings or update the controller with tampered firmware. CVE-2022-29519 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N). 3.2.2 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product uses hard-coded credentials, which could enable an attacker to read/change configuration settings or update the controller with tampered firmware. Note, single CPU modules of the FCN/FCJ controller are unaffected. CVE-2022-30997 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-174-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CROSS-SITE SCRIPTING CWE-79 The software does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters. CVE-2022-2140 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 RELATIVE PATH TRAVERSAL CWE-23 The software does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files. CVE-2022-2106 has been assigned to this vulnerability. A CVSS v3 base score of 3.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N). 3.2.3 IMPROPER ACCESS CONTROL CWE-284 An authenticated user with admin privileges may be able to terminate any process on the system running SmartICS. CVE-2022-2088 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to view files on the system or terminate processes on the system.
3.2.1 CROSS-SITE SCRIPTING CWE-79 The software does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters. CVE-2022-2140 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 RELATIVE PATH TRAVERSAL CWE-23 The software does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files. CVE-2022-2106 has been assigned to this vulnerability. A CVSS v3 base score of 3.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N). 3.2.3 IMPROPER ACCESS CONTROL CWE-284 An authenticated user with admin privileges may be able to terminate any process on the system running SmartICS. CVE-2022-2088 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF CLIENT-SIDE AUTHENTICATION CWE-603 Affected applications use client-side only authentication when neither server-side authentication nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. CVE-2022-33139 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.
3.2.1 USE OF CLIENT-SIDE AUTHENTICATION CWE-603 Affected applications use client-side only authentication when neither server-side authentication nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. CVE-2022-33139 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product does not feature a function to authenticate communication protocols, which could allow an unauthorized attacker to change or download the configuration, start or stop services, update or modify the firmware, or shut down the device. CVE-2019-9201 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an unauthorized attacker to change configurations, manipulate services, or cause a denial-of-service condition.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product does not feature a function to authenticate communication protocols, which could allow an unauthorized attacker to change or download the configuration, start or stop services, update or modify the firmware, or shut down the device. CVE-2019-9201 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks an integrity check in the SDK, which could allow an attacker to upload logic with arbitrary malicious code. CVE-2022-31801 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to upload arbitrary malicious code after gaining access to the communication to products utilizing ProConOS/ProConOS eCLR or MULTIPROG.
3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks an integrity check in the SDK, which could allow an attacker to upload logic with arbitrary malicious code. CVE-2022-31801 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks a function to check integrity and authenticity of uploaded logic, which could allow an attacker to execute malicious code on the device. CVE-2022-31800 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to upload logic with arbitrary code.
3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks a function to check integrity and authenticity of uploaded logic, which could allow an attacker to execute malicious code on the device. CVE-2022-31800 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product lacks authentication functionality, which could allow an attacker to change controller configurations, manipulate data, or cause a denial-of-service condition. CVE-2022-29951 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.2 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks privilege separation capabilities, which could allow an attacker to execute arbitrary machine code. CVE-2022-29958 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H).
Successful exploitation of this vulnerability could cause a denial-of-service condition, change control logic, or disable communication links.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected product lacks authentication functionality, which could allow an attacker to change controller configurations, manipulate data, or cause a denial-of-service condition. CVE-2022-29951 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H). 3.2.2 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The affected product lacks privilege separation capabilities, which could allow an attacker to execute arbitrary machine code. CVE-2022-29958 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-17-285-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288 An attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) could bypass the authentication and download sensitive information from the device. CVE-2017-9946 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.2 PATH TRAVERSAL CWE-22 A directory traversal vulnerability could allow a remote attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) to obtain information on the structure of the file system of the affected devices. CVE-2017-9947 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Successful exploitation of these vulnerabilities could allow unauthenticated attackers with access to the integrated webserver to download sensitive information.
4.2.1 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288 An attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) could bypass the authentication and download sensitive information from the device. CVE-2017-9946 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.2 PATH TRAVERSAL CWE-22 A directory traversal vulnerability could allow a remote attacker with network access to the integrated web server (Ports 80/TCP and 443/TCP) to obtain information on the structure of the file system of the affected devices. CVE-2017-9947 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 PROFINET-IO (PNIO) stack versions prior v06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. This could lead to a denial-of-service condition due to lack of memory for devices that include a vulnerable version of the stack. CVE-2019-13946 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could lead to a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 PROFINET-IO (PNIO) stack versions prior v06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. This could lead to a denial-of-service condition due to lack of memory for devices that include a vulnerable version of the stack. CVE-2019-13946 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-222-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 OUT-OF-BOUNDS READ CWE-125 The affected products are vulnerable to an out-of-bounds read vulnerability in mod_cap via the cap_text.ccap_to_text function, which could lead to information disclosure. CVE-2020-9272 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.2 USE AFTER FREE CWE-416 A malicious attacker could corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free condition in alloc_pool in pool.c, which could lead to remote code execution. CVE-2020-9273 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow a remote attacker to access sensitive information and execute arbitrary code.
4.2.1 OUT-OF-BOUNDS READ CWE-125 The affected products are vulnerable to an out-of-bounds read vulnerability in mod_cap via the cap_text.ccap_to_text function, which could lead to information disclosure. CVE-2020-9272 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.2 USE AFTER FREE CWE-416 A malicious attacker could corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free condition in alloc_pool in pool.c, which could lead to remote code execution. CVE-2020-9273 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-257-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext. CVE-2021-33716 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow an attacker to read sensitive information.
4.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext. CVE-2021-33716 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The Datalogics APDFL library used in affected products is vulnerable to memory corruption condition while parsing specially crafted PDF files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-38405 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.2 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2022.11 used in affected products contains an out-of-bounds write vulnerability when parsing a DXF file. An attacker can leverage this vulnerability to execute code in the context of the current process. CVE-2021-43336 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.3 HEAP-BASED BUFFER OVERFLOW CWE-122 The plmxmlAdapterSE70.dll contains an out-of-bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. CVE-2021-44000 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.4 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-44016 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.5 OUT-OF-BOUNDS READ CWE-125 The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-44018 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could lead the application to crash or potentially lead to arbitrary code execution.
4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The Datalogics APDFL library used in affected products is vulnerable to memory corruption condition while parsing specially crafted PDF files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-38405 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.2 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2022.11 used in affected products contains an out-of-bounds write vulnerability when parsing a DXF file. An attacker can leverage this vulnerability to execute code in the context of the current process. CVE-2021-43336 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.3 HEAP-BASED BUFFER OVERFLOW CWE-122 The plmxmlAdapterSE70.dll contains an out-of-bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. CVE-2021-44000 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.4 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-44016 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.5 OUT-OF-BOUNDS READ CWE-125 The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2021-44018 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 FAILURE TO SANITIZE SPECIAL ELEMENTS INTO A DIFFERENT PLANE (SPECIAL ELEMENT INJECTION) CWE-75 The addCell JavaScript function fails to properly sanitize user-controllable input before including it into the generated XML body of the XLS report document as it is possible to inject arbitrary content (e.g., XML tags) into the generated file. An attacker with restricted privileges could corrupt the content used to generate XLS reports to leverage the application to deliver malicious files against higher-privileged users and obtain remote code execution (RCE) against the administrators workstation. CVE-2022-24039 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H). 4.2.2 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial-of-service condition through CPU consumption by setting a PBKDF2 derived key with a high-cost effort, followed by a login attempt to the modified account. CVE-2022-24040 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 4.2.3 USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916 The web application stores the PBKDF2 derived key of users passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users. CVE-2022-24041 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.4 INSUFFICIENT SESSION EXPIRATION CWE-613 The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could capture this token and re-use old session credentials or session IDs for authorization. CVE-2022-24042 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.5 OBSERVABLE DISCREPANCY CWE-203 The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames. CVE-2022-24043 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 4.2.6 IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307 The login functionality of the application does not employ countermeasures against password spraying attacks or credential stuffing attacks. An attacker could obtain a list of valid usernames on the device and use that list to perform a precise password spraying or credential stuffing attack to obtain access to at least one account. CVE-2022-24044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.7 SENSITIVE COOKIE IN HTTPS SESSION WITHOUT SECURE ATTRIBUTE CWE-614 Following a successful login, the application sets the session cookie on the browser via client-side JavaScript code without applying security attributes (such as Secure HttpOnly or SameSite). Any attempts to browse the application via unencrypted HTTP protocol would lead to the transmission of all session cookies in plaintext through the network. An attacker could then sniff the network and capture sensitive information. CVE-2022-24045 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.8 UNCAUGHT EXCEPTION CWE-248 When the controller receives a specific BACnet protocol packet, an exception causes the BACnet communication function to go into a out of work state and could result in the controller going into a factory reset state. CVE-2021-41545 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to potentially intercept unencrypted transmission of sensitive information, cause a denial-of-service condition, perform remote code execution, or disable and reset a device to factory state.
4.2.1 FAILURE TO SANITIZE SPECIAL ELEMENTS INTO A DIFFERENT PLANE (SPECIAL ELEMENT INJECTION) CWE-75 The addCell JavaScript function fails to properly sanitize user-controllable input before including it into the generated XML body of the XLS report document as it is possible to inject arbitrary content (e.g., XML tags) into the generated file. An attacker with restricted privileges could corrupt the content used to generate XLS reports to leverage the application to deliver malicious files against higher-privileged users and obtain remote code execution (RCE) against the administrators workstation. CVE-2022-24039 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H). 4.2.2 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial-of-service condition through CPU consumption by setting a PBKDF2 derived key with a high-cost effort, followed by a login attempt to the modified account. CVE-2022-24040 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 4.2.3 USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916 The web application stores the PBKDF2 derived key of users passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users. CVE-2022-24041 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.4 INSUFFICIENT SESSION EXPIRATION CWE-613 The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could capture this token and re-use old session credentials or session IDs for authorization. CVE-2022-24042 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.5 OBSERVABLE DISCREPANCY CWE-203 The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames. CVE-2022-24043 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 4.2.6 IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307 The login functionality of the application does not employ countermeasures against password spraying attacks or credential stuffing attacks. An attacker could obtain a list of valid usernames on the device and use that list to perform a precise password spraying or credential stuffing attack to obtain access to at least one account. CVE-2022-24044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.7 SENSITIVE COOKIE IN HTTPS SESSION WITHOUT SECURE ATTRIBUTE CWE-614 Following a successful login, the application sets the session cookie on the browser via client-side JavaScript code without applying security attributes (such as Secure HttpOnly or SameSite). Any attempts to browse the application via unencrypted HTTP protocol would lead to the transmission of all session cookies in plaintext through the network. An attacker could then sniff the network and capture sensitive information. CVE-2022-24045 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.8 UNCAUGHT EXCEPTION CWE-248 When the controller receives a specific BACnet protocol packet, an exception causes the BACnet communication function to go into a out of work state and could result in the controller going into a factory reset state. CVE-2021-41545 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INSECURE DEFAULT INITIALIZATION OF RESOURCE CWE-1188 An authenticated attacker could escape the WinCC kiosk mode by opening the printer dialog in the affected application if no printer is installed. CVE-2022-24287 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow authenticated attackers to escape the kiosk mode.
4.2.1 INSECURE DEFAULT INITIALIZATION OF RESOURCE CWE-1188 An authenticated attacker could escape the WinCC kiosk mode by opening the printer dialog in the affected application if no printer is installed. CVE-2022-24287 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-17
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF INCORRECTLY-RESOLVED NAME OR REFERENCE CWE-706 libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse. Errors in the logic could lead to libcurl reusing wrong connections. CVE-2021-22924 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 USE OF UNINITIALIZED RESOURCE CWE-908 curl supports the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl. Due to a flaw in the option parser, libcurl could pass on uninitialized data from a stack-based buffer to the server, revealing sensitive internal information to the server. CVE-2021-22925 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.3 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 In Expat, also called libexpat, versions prior to 2.4.3 a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior. CVE-2021-45960 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.4 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In doProlog in xmlparse.c in Expat, also called libexpat, versions prior to 2.4.3, an integer overflow exists for m_groupSize. CVE-2021-46143 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 INTEGER OVERFLOW OR WRAPAROUND CWE-190 addBinding in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22822 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 INTEGER OVERFLOW OR WRAPAROUND CWE-190 build_model in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22823 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 defineAttribute in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 INTEGER OVERFLOW OR WRAPAROUND CWE-190 lookup in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22825 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.9 INTEGER OVERFLOW OR WRAPAROUND CWE-190 nextScaffoldPart in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22826 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.10 INTEGER OVERFLOW OR WRAPAROUND CWE-190 storeAtts in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22827 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.11 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Expat, also called libexpat, versions prior to 2.4.4 have a signed integer overflow in XML_GetBuffer for configurations with a nonzero XML_CONTEXT_BYTES. CVE-2022-23852 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.12 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Expat, also called libexpat, versions prior to 2.4.4 have an integer overflow in the doProlog function. CVE-2022-23990 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.13 IMPROPER ENCODING OR ESCAPING OF OUTPUT CWE-116 xmltok_impl.c in Expat, also called libexpat, versions prior to 2.4.5 lack a certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. CVE-2022-25235 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.14 EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668 xmlparse.c in Expat, also called libexpat, versions prior to 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. CVE-2022-25236 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.15 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 In Expat, also called libexpat, versions prior to 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element. CVE-2022-25313 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H). 3.2.16 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In Expat, also called libexpat versions prior to 2.4.5, there is an integer overflow in copyString. CVE-2022-25314 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.17 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In Expat, also called libexpat, versions prior to 2.4.5, there is an integer overflow in storeRawNames. CVE-2022-25315 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.18 CRYPTOGRAPHIC ISSUES CWE-310 An attacker employing a machine-in-the-middle attack could obtain plaintext secret values by observing length differences during a series of guesses, in which a string in an HTTP request URL matches an unknown string in an HTTP response body (i.e., BREACH attack). CVE-2022-27221 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.19 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code, allowing reflected cross-site scripting attacks. CVE-2022-29034 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 3.2.20 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 There is a missing authentication verification for a resource used to change the roles and permissions of a user. This could allow an attacker to change the permissions of any user and gain privileges of an administrative user. CVE-2022-32251 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.21 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The application does not perform the integrity check of the update packages. Without validation, an admin user could be tricked to install a malicious package, granting root privileges to an attacker. CVE-2022-32252 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.22 IMPROPER INPUT VALIDATION CWE-20 Due to improper input validation, the OpenSSL certificates password could be printed to a file reachable by an attacker. CVE-2022-32253 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 3.2.23 INSERTION OF SENSITIVE INFORMATION INTO LOG FILE CWE-532 A customized HTTP POST request could force the application to write the status of a given user to a log file, exposing sensitive user information. CVE-2022-32254 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.24 IMPROPER ACCESS CONTROL CWE-284 The affected applications web service lacks proper access control for some endpoints. This vulnerability could lead to unauthorized access to information. CVE-2022-32255 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.25 IMPROPER ACCESS CONTROL CWE-284 The affected applications web service lacks proper access control for some endpoints. This could lead to low privileged users access to privileged information. CVE-2022-32256 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.26 OBSOLETE FEATURE IN UI CWE-448 The affected application allows the import of device configurations via a specific endpoint, which could allow information disclosure. CVE-2022-32258 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.27 IMPROPER ACCESS TO SENSITIVE INFORMATION USING DEBUG AND TEST INTERFACES CWE-1244 The system images for installation or update of the affected application contain unit test scripts with sensitive information. An attacker could gain information about testing architecture and tamper with test configuration. CVE-2022-32259 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.28 INCORRECT USER MANAGEMENT CWE-286 The affected application creates temporary user credentials for UMC (User Management Component) users. An attacker could use these temporary credentials for authentication bypass. CVE-2022-32260 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.29 IMPROPER HANDLING OF PARAMETERS CWE-223 The affected application contains a misconfiguration in the APT update. This vulnerability could allow an attacker to add insecure packages to the application. CVE-2022-32261 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 3.2.30 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 The affected application contains a file upload server vulnerable to command injection. An attacker could exploit this vulnerability to achieve arbitrary code execution. CVE-2022-32262 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to escalate privileges, disclose information, or allow code execution.
3.2.1 USE OF INCORRECTLY-RESOLVED NAME OR REFERENCE CWE-706 libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse. Errors in the logic could lead to libcurl reusing wrong connections. CVE-2021-22924 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 USE OF UNINITIALIZED RESOURCE CWE-908 curl supports the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl. Due to a flaw in the option parser, libcurl could pass on uninitialized data from a stack-based buffer to the server, revealing sensitive internal information to the server. CVE-2021-22925 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.3 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 In Expat, also called libexpat, versions prior to 2.4.3 a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior. CVE-2021-45960 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.4 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In doProlog in xmlparse.c in Expat, also called libexpat, versions prior to 2.4.3, an integer overflow exists for m_groupSize. CVE-2021-46143 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 INTEGER OVERFLOW OR WRAPAROUND CWE-190 addBinding in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22822 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 INTEGER OVERFLOW OR WRAPAROUND CWE-190 build_model in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22823 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 defineAttribute in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22824 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 INTEGER OVERFLOW OR WRAPAROUND CWE-190 lookup in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22825 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.9 INTEGER OVERFLOW OR WRAPAROUND CWE-190 nextScaffoldPart in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22826 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.10 INTEGER OVERFLOW OR WRAPAROUND CWE-190 storeAtts in xmlparse.c in Expat, also called libexpat, has an integer overflow in versions prior to 2.4.3. CVE-2022-22827 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.11 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Expat, also called libexpat, versions prior to 2.4.4 have a signed integer overflow in XML_GetBuffer for configurations with a nonzero XML_CONTEXT_BYTES. CVE-2022-23852 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.12 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Expat, also called libexpat, versions prior to 2.4.4 have an integer overflow in the doProlog function. CVE-2022-23990 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.13 IMPROPER ENCODING OR ESCAPING OF OUTPUT CWE-116 xmltok_impl.c in Expat, also called libexpat, versions prior to 2.4.5 lack a certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. CVE-2022-25235 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.14 EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668 xmlparse.c in Expat, also called libexpat, versions prior to 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. CVE-2022-25236 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.15 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 In Expat, also called libexpat, versions prior to 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element. CVE-2022-25313 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H). 3.2.16 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In Expat, also called libexpat versions prior to 2.4.5, there is an integer overflow in copyString. CVE-2022-25314 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.17 INTEGER OVERFLOW OR WRAPAROUND CWE-190 In Expat, also called libexpat, versions prior to 2.4.5, there is an integer overflow in storeRawNames. CVE-2022-25315 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.18 CRYPTOGRAPHIC ISSUES CWE-310 An attacker employing a machine-in-the-middle attack could obtain plaintext secret values by observing length differences during a series of guesses, in which a string in an HTTP request URL matches an unknown string in an HTTP response body (i.e., BREACH attack). CVE-2022-27221 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.19 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code, allowing reflected cross-site scripting attacks. CVE-2022-29034 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 3.2.20 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 There is a missing authentication verification for a resource used to change the roles and permissions of a user. This could allow an attacker to change the permissions of any user and gain privileges of an administrative user. CVE-2022-32251 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.21 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The application does not perform the integrity check of the update packages. Without validation, an admin user could be tricked to install a malicious package, granting root privileges to an attacker. CVE-2022-32252 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.22 IMPROPER INPUT VALIDATION CWE-20 Due to improper input validation, the OpenSSL certificates password could be printed to a file reachable by an attacker. CVE-2022-32253 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 3.2.23 INSERTION OF SENSITIVE INFORMATION INTO LOG FILE CWE-532 A customized HTTP POST request could force the application to write the status of a given user to a log file, exposing sensitive user information. CVE-2022-32254 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.24 IMPROPER ACCESS CONTROL CWE-284 The affected applications web service lacks proper access control for some endpoints. This vulnerability could lead to unauthorized access to information. CVE-2022-32255 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.25 IMPROPER ACCESS CONTROL CWE-284 The affected applications web service lacks proper access control for some endpoints. This could lead to low privileged users access to privileged information. CVE-2022-32256 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.26 OBSOLETE FEATURE IN UI CWE-448 The affected application allows the import of device configurations via a specific endpoint, which could allow information disclosure. CVE-2022-32258 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.27 IMPROPER ACCESS TO SENSITIVE INFORMATION USING DEBUG AND TEST INTERFACES CWE-1244 The system images for installation or update of the affected application contain unit test scripts with sensitive information. An attacker could gain information about testing architecture and tamper with test configuration. CVE-2022-32259 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.28 INCORRECT USER MANAGEMENT CWE-286 The affected application creates temporary user credentials for UMC (User Management Component) users. An attacker could use these temporary credentials for authentication bypass. CVE-2022-32260 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). 3.2.29 IMPROPER HANDLING OF PARAMETERS CWE-223 The affected application contains a misconfiguration in the APT update. This vulnerability could allow an attacker to add insecure packages to the application. CVE-2022-32261 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 3.2.30 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 The affected application contains a file upload server vulnerable to command injection. An attacker could exploit this vulnerability to achieve arbitrary code execution. CVE-2022-32262 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 A local privilege escalation vulnerability could allow an attacker to craft environment variables and execute arbitrary code. When successfully executed, the attack can cause a local privilege escalation, giving unprivileged users administrative rights on the target machine. CVE-2021-4034 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an unprivileged local user to escalate privileges and gain administrative rights.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 A local privilege escalation vulnerability could allow an attacker to craft environment variables and execute arbitrary code. When successfully executed, the attack can cause a local privilege escalation, giving unprivileged users administrative rights on the target machine. CVE-2021-4034 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 The affected product is vulnerable to a reflected cross-site scripting (XSS) vulnerability that exists in the web interface of the affected application that could allow an attacker to execute malicious code by tricking users into accessing a malicious link. CVE-2022-32145 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Successful exploitation of this vulnerability could allow for malicious code execution.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 The affected product is vulnerable to a reflected cross-site scripting (XSS) vulnerability that exists in the web interface of the affected application that could allow an attacker to execute malicious code by tricking users into accessing a malicious link. CVE-2022-32145 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 An unauthenticated attacker could log into the component Shared HIS, which is used in Spectrum Power systems, by using an account with default credentials. A successful exploitation could allow the attacker to access the component Shared HIS with administrative privileges. CVE-2022-26476 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to gain administrative privileges by using an account with default credentials.
3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 An unauthenticated attacker could log into the component Shared HIS, which is used in Spectrum Power systems, by using an account with default credentials. A successful exploitation could allow the attacker to access the component Shared HIS with administrative privileges. CVE-2022-26476 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected application assigns improper access rights to the service executable. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. CVE-2022-31465 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected application assigns improper access rights to the service executable. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. CVE-2022-31465 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER VALIDATION OF INTEGRITY CHECK VALUE CWE-354 The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS update messages. Successful exploitation requires OSPF to be enabled on an affected device and could allow an unauthenticated remote attacker to cause network interruptions. CVE-2021-37182 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to cause interruptions in the network.
3.2.1 IMPROPER VALIDATION OF INTEGRITY CHECK VALUE CWE-354 The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS update messages. Successful exploitation requires OSPF to be enabled on an affected device and could allow an unauthenticated remote attacker to cause network interruptions. CVE-2021-37182 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications using the file upload form handler, as well as those that use parts of the user-controlled filename in the output path, are susceptible to directory traversal. CVE-2020-27304 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER INITIALIZATION CWE-665 A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial-of-service condition, slowing and eventually stopping the system while running OSP. CVE-2021-20317 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 3.2.3 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a large space in the stack. CVE-2021-33910 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.4 CONCURRENT EXECUTION USING SHARED RESOURCE WITH IMPROPER SYNCHRONIZATION ('RACE CONDITION') CWE-362 A race condition vulnerability exists in Go. The incoming requests bodies are not closed after the handler panic, which could lead to a Reverse Proxy crash. CVE-2021-36221 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The fix for CVE-2021-33196 can be bypassed by crafted inputs. As a result, the NewReader and OpenReader functions in archive/zip can still cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. CVE-2021-39293 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.6 IMPROPER PRESERVATION OF PERMISSIONS CWE-281 A vulnerability exists in Moby (Docker Engine) where attempting to copy files using docker cp into a specially crafted container can result in UNIX file permission changes for existing files in the hosts filesystem, widening access to others. This does not directly allow files to be read, modified, or executed without an additional cooperating process. CVE-2021-41089 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N). 3.2.7 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 A vulnerability exists in Moby (Docker Engine) where the data directory contains subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. CVE-2021-41091 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L). 3.2.8 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 A vulnerability exists in the Docker CLI where running docker login my-private-registry.example.com with a misconfigured configuration file would result in any provided credentials being sent to registry-1.docker.io rather than the intended private registry. CVE-2021-41092 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N). 3.2.9 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL) CWE-22 A vulnerability exists in container where container root directories and some plugins have insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. CVE-2021-41103 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 3.2.10 IMPROPER PRESERVATION OF PERMISSIONS CWE-281 A vulnerability exists in the flags member of the new pipe buffer structure in the Linux kernel and could contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. CVE-2022-0847 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the products confidentiality, integrity, and availability.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications using the file upload form handler, as well as those that use parts of the user-controlled filename in the output path, are susceptible to directory traversal. CVE-2020-27304 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER INITIALIZATION CWE-665 A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial-of-service condition, slowing and eventually stopping the system while running OSP. CVE-2021-20317 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 3.2.3 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a large space in the stack. CVE-2021-33910 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.4 CONCURRENT EXECUTION USING SHARED RESOURCE WITH IMPROPER SYNCHRONIZATION ('RACE CONDITION') CWE-362 A race condition vulnerability exists in Go. The incoming requests bodies are not closed after the handler panic, which could lead to a Reverse Proxy crash. CVE-2021-36221 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The fix for CVE-2021-33196 can be bypassed by crafted inputs. As a result, the NewReader and OpenReader functions in archive/zip can still cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. CVE-2021-39293 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.6 IMPROPER PRESERVATION OF PERMISSIONS CWE-281 A vulnerability exists in Moby (Docker Engine) where attempting to copy files using docker cp into a specially crafted container can result in UNIX file permission changes for existing files in the hosts filesystem, widening access to others. This does not directly allow files to be read, modified, or executed without an additional cooperating process. CVE-2021-41089 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N). 3.2.7 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 A vulnerability exists in Moby (Docker Engine) where the data directory contains subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. CVE-2021-41091 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L). 3.2.8 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 A vulnerability exists in the Docker CLI where running docker login my-private-registry.example.com with a misconfigured configuration file would result in any provided credentials being sent to registry-1.docker.io rather than the intended private registry. CVE-2021-41092 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N). 3.2.9 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL) CWE-22 A vulnerability exists in container where container root directories and some plugins have insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. CVE-2021-41103 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 3.2.10 IMPROPER PRESERVATION OF PERMISSIONS CWE-281 A vulnerability exists in the flags member of the new pipe buffer structure in the Linux kernel and could contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. CVE-2022-0847 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change the data of a user. CVE-2022-30229 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions. CVE-2022-30230 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.3 TRANSMISSION OF PRIVATE RESOURCES INTO A NEW SPHERE ('RESOURCE LEAK') CWE-402 The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash. CVE-2022-30231 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker access to critical API functions, cross-origin resource sharing, and credentials.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change the data of a user. CVE-2022-30229 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.2 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions. CVE-2022-30230 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.3 TRANSMISSION OF PRIVATE RESOURCES INTO A NEW SPHERE ('RESOURCE LEAK') CWE-402 The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash. CVE-2022-30231 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 The affected product has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. CVE-2022-2006 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected products HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. CVE-2022-2005 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could cause a loss of sensitive information and the ability to run code execution with elevated privileges.
3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 The affected product has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. CVE-2022-2006 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected products HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. CVE-2022-2005 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The affected applications contain a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint. This could allow an attacker to crash the affected application, leading to a denial-of-service condition. CVE-2022-30937 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could lead to the product crashing or the creation of a denial-of-service condition.
3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The affected applications contain a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint. This could allow an attacker to crash the affected application, leading to a denial-of-service condition. CVE-2022-30937 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 The affected module is vulnerable to XML external entity (XXE) attacks due to insufficient input sanitation. This may allow an attacker to disclose confidential data under certain circumstances. CVE-2022-32285 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated, the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 In certain configurations the SAML module is vulnerable to cross-site scripting (XSS) attacks due to insufficient error message sanitation. This could allow an attacker to execute malicious code by tricking users into accessing a malicious link. CVE-2022-32286 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated, the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
Successful exploitation of these vulnerabilities may allow an attacker to disclose confidential data under certain circumstances.
3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 The affected module is vulnerable to XML external entity (XXE) attacks due to insufficient input sanitation. This may allow an attacker to disclose confidential data under certain circumstances. CVE-2022-32285 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated, the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 In certain configurations the SAML module is vulnerable to cross-site scripting (XSS) attacks due to insufficient error message sanitation. This could allow an attacker to execute malicious code by tricking users into accessing a malicious link. CVE-2022-32286 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated, the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 USE AFTER FREE CWE-416 libcurl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious attacker can use this to reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (as with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established and the function will then access a memory buffer that might be freed. When using that memory, libcurl may call a function pointer in the object, making it possible for remote code execution if the server could manage to get crafted memory content into the correct place in memory. CVE-2021-22901 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 USE AFTER FREE CWE-416 libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. Due to errors in the logic, the config matching function did not take issuercert into account and compares the involved paths case insensitively, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems and can vary depending on used file systems. The comparison also didnt include the issuer cert, which a transfer can set to qualify how to verify the server certificate. CVE-2021-22924 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Successful exploitation of these vulnerabilities could crash and allow an attacker to interfere with the affected products in various ways.
4.2.1 USE AFTER FREE CWE-416 libcurl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious attacker can use this to reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (as with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established and the function will then access a memory buffer that might be freed. When using that memory, libcurl may call a function pointer in the object, making it possible for remote code execution if the server could manage to get crafted memory content into the correct place in memory. CVE-2021-22901 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 USE AFTER FREE CWE-416 libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. Due to errors in the logic, the config matching function did not take issuercert into account and compares the involved paths case insensitively, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems and can vary depending on used file systems. The comparison also didnt include the issuer cert, which a transfer can set to qualify how to verify the server certificate. CVE-2021-22924 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-165-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to an improper input validation in various web functions, which could allow an attacker to perform remote code execution or cause a denial-of-service condition. CVE-2022-25163 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could result in a denial-of-service condition and/or enable remote code execution.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to an improper input validation in various web functions, which could allow an attacker to perform remote code execution or cause a denial-of-service condition. CVE-2022-25163 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-165-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 Private user information such as name, address, and daily energy usage can be accessed online without proper authentication. CVE-2022-29578 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could result in a disclosure of sensitive information.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 Private user information such as name, address, and daily energy usage can be accessed online without proper authentication. CVE-2022-29578 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-165-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNVERIFIED PASSWORD CHANGE CWE-620 The affected products allow passwords to be guessed at a high rate. CVE-2022-21935 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 It is possible to inject and store malicious code into the web interfaces of the affected products. CVE-2022-21937 has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 It is possible to inject and store malicious code into the Draft Graphics (MUI Graphics) web interfaces of the affected products. CVE-2022-21938 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N).
Successful exploitation of these vulnerabilities could allow unauthorized users to compromise passwords and inject malicious code into web interfaces.
3.2.1 UNVERIFIED PASSWORD CHANGE CWE-620 The affected products allow passwords to be guessed at a high rate. CVE-2022-21935 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 It is possible to inject and store malicious code into the web interfaces of the affected products. CVE-2022-21937 has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 It is possible to inject and store malicious code into the Draft Graphics (MUI Graphics) web interfaces of the affected products. CVE-2022-21938 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-160-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Use of a broken or risky cryptographic algorithm allows a remote unauthenticated attacker to cause a disclosure of an encrypted message from the air conditioning systems by sniffing encrypted communications. CVE-2022-24296 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately 4 billion blocks. This which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode (a.k.a. a Sweet32 attack). CVE-2016-2183 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.3 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases that make it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions using the same plaintext. CVE-2013-2566 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.4 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 This vulnerability makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that relies on keys affected by the Invariance Weakness. An attacker can then use a brute-force approach involving LSB values (a.k.a. the Bar Mitzvah issue). CVE-2015-2808 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.5 CHANNEL ACCESSIBLE BY NON-ENDPOINT CWE-300 The TLS protocol and the SSL Protocol 3.0 and earlier do not properly associate renegotiation handshakes with an existing connection in some third-party products. This allows machine-in-the-middle attackers to insert data into sessions protected by TLS or SSL by sending an unauthenticated request processed retroactively by a server in a post-renegotiation context. CVE-2009-3555 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to disclose or tamper data in communication between the air conditioning system and the external computers or cause a denial-of-service condition.
3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Use of a broken or risky cryptographic algorithm allows a remote unauthenticated attacker to cause a disclosure of an encrypted message from the air conditioning systems by sniffing encrypted communications. CVE-2022-24296 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately 4 billion blocks. This which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode (a.k.a. a Sweet32 attack). CVE-2016-2183 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.3 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases that make it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions using the same plaintext. CVE-2013-2566 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.4 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 This vulnerability makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that relies on keys affected by the Invariance Weakness. An attacker can then use a brute-force approach involving LSB values (a.k.a. the Bar Mitzvah issue). CVE-2015-2808 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.5 CHANNEL ACCESSIBLE BY NON-ENDPOINT CWE-300 The TLS protocol and the SSL Protocol 3.0 and earlier do not properly associate renegotiation handshakes with an existing connection in some third-party products. This allows machine-in-the-middle attackers to insert data into sessions protected by TLS or SSL by sending an unauthenticated request processed retroactively by a server in a post-renegotiation context. CVE-2009-3555 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-153-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 PROTECTION MECHANISM FAILURE CWE-693 An unauthenticated attacker can update the hostname with a specially crafted name, allowing shell command execution during the core collection process. CVE-2022-31479 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). 3.2.2 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker could arbitrarily upload firmware files to the target device, ultimately causing a denial-of-service condition. CVE-2022-31480 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. CVE-2022-31481 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.4 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An unauthenticated attacker can send a specially crafted unauthenticated HTTP request to the device that can overflow a buffer. CVE-2022-31482 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 An authenticated attacker can manipulate a filename to achieve the ability to upload the desired file anywhere on the filesystem. CVE-2022-31483 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). 3.2.6 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker can send a specially crafted network packet to delete a user from the web interface. CVE-2022-31484 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.7 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker can send a specially crafted packet to update the notes section on the home page of the web interface. CVE-2022-31485 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 3.2.8 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 An authenticated attacker can send a specially crafted route to a specific binary causing it to execute shell commands. CVE-2022-31486 has been assigned to this vulnerability. A CVSS v3 base score 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker access to the device, allowing monitoring of all communications sent to and from the device, modification of onboard relays, changing of configuration files, device instability, and a denial-of-service condition.
3.2.1 PROTECTION MECHANISM FAILURE CWE-693 An unauthenticated attacker can update the hostname with a specially crafted name, allowing shell command execution during the core collection process. CVE-2022-31479 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). 3.2.2 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker could arbitrarily upload firmware files to the target device, ultimately causing a denial-of-service condition. CVE-2022-31480 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. CVE-2022-31481 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.4 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An unauthenticated attacker can send a specially crafted unauthenticated HTTP request to the device that can overflow a buffer. CVE-2022-31482 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 An authenticated attacker can manipulate a filename to achieve the ability to upload the desired file anywhere on the filesystem. CVE-2022-31483 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). 3.2.6 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker can send a specially crafted network packet to delete a user from the web interface. CVE-2022-31484 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.7 DIRECT REQUEST ('FORCED BROWSING') CWE-425 An unauthenticated attacker can send a specially crafted packet to update the notes section on the home page of the web interface. CVE-2022-31485 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 3.2.8 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 An authenticated attacker can send a specially crafted route to a specific binary causing it to execute shell commands. CVE-2022-31486 has been assigned to this vulnerability. A CVSS v3 base score 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-151-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow while processing a specifically crafted project file, which may allow an attacker to execute arbitrary code. CVE-2022-1888 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow arbitrary code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow while processing a specifically crafted project file, which may allow an attacker to execute arbitrary code. CVE-2022-1888 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 USE OF PASSWORD HASH INSTEAD OF PASSWORD FOR AUTHENTICATION CWE-836 This vulnerability allows a remote unauthenticated attacker to log in to the product by replaying an eavesdropped password hash. CVE-2022-25155 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). 4.2.2 USE OF WEAK HASH CWE-328 This vulnerability could allow a remote unauthenticated attacker to log in to the product by using a password reversed from an eavesdropped password hash. CVE-2022-25156 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 USE OF PASSWORD HASH INSTEAD OF PASSWORD FOR AUTHENTICATION CWE-836 This vulnerability could allow a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash. CVE-2022-25157 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.4 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 This vulnerability could allow a remote attacker to disclose or tamper with a file where the password hash is saved in cleartext. CVE-2022-25158 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.5 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 This vulnerability could allow a remote unauthenticated attacker to log in to the product by replay attack. CVE-2022-25159 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). 4.2.6 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 This vulnerability could allow a remote unauthenticated attacker to disclose a file in a legitimate user's product by using previously eavesdropped cleartext information and to counterfeit a legitimate users system. CVE-2022-25160 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities may allow an attacker to log in to the affected products and/or alter and obtain sensitive information.
4.2.1 USE OF PASSWORD HASH INSTEAD OF PASSWORD FOR AUTHENTICATION CWE-836 This vulnerability allows a remote unauthenticated attacker to log in to the product by replaying an eavesdropped password hash. CVE-2022-25155 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). 4.2.2 USE OF WEAK HASH CWE-328 This vulnerability could allow a remote unauthenticated attacker to log in to the product by using a password reversed from an eavesdropped password hash. CVE-2022-25156 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 USE OF PASSWORD HASH INSTEAD OF PASSWORD FOR AUTHENTICATION CWE-836 This vulnerability could allow a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash. CVE-2022-25157 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.4 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 This vulnerability could allow a remote attacker to disclose or tamper with a file where the password hash is saved in cleartext. CVE-2022-25158 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.5 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 This vulnerability could allow a remote unauthenticated attacker to log in to the product by replay attack. CVE-2022-25159 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). 4.2.6 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 This vulnerability could allow a remote unauthenticated attacker to disclose a file in a legitimate user's product by using previously eavesdropped cleartext information and to counterfeit a legitimate users system. CVE-2022-25160 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-139-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to a specially crafted packet, which may allow an attacker to cause a denial-of-service condition where a system reset is required for recovery. CVE-2022-25161 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). 4.2.2 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to a specially crafted packet, which may allow an attacker to cause a denial-of-service condition. CVE-2022-25162 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of these vulnerabilities could cause a denial-of-service condition by sending specially crafted packets. A system reset is required for recovery.
4.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to a specially crafted packet, which may allow an attacker to cause a denial-of-service condition where a system reset is required for recovery. CVE-2022-25161 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). 4.2.2 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to a specially crafted packet, which may allow an attacker to cause a denial-of-service condition. CVE-2022-25162 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-146-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code. CVE-2022-27184 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-28690 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-29488 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-30540 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code by opening a malicious file.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code. CVE-2022-27184 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-28690 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-29488 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code. CVE-2022-30540 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-146-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 RELATIVE PATH TRAVERSAL CWE-23 The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. CVE-2022-1661 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 DESERIALIZATION OF UNTRUSTED DATA CWE-502 The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code. CVE-2022-1660 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to obtain arbitrary operating system files and execute arbitrary code.
3.2.1 RELATIVE PATH TRAVERSAL CWE-23 The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. CVE-2022-1661 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 DESERIALIZATION OF UNTRUSTED DATA CWE-502 The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code. CVE-2022-1660 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-144-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 The affected product is vulnerable to a condition where a low-privileged user allowed to connect to the OPC server to use the functions of the IPersisFile can execute operating system processes with system-level privileges. CVE-2022-1261 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N).
Successful exploitation of this vulnerability could allow an attacker to achieve remote command execution with system-level privileges through the support of the IPersistFile COM interface.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 The affected product is vulnerable to a condition where a low-privileged user allowed to connect to the OPC server to use the functions of the IPersisFile can execute operating system processes with system-level privileges. CVE-2022-1261 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-144-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. CVE-2022-1797 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability may allow an unauthorized user to send malicious messages to the targeted device, which could lead to a denial-of-service condition.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. CVE-2022-1797 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-137-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address. CVE-2022-1669 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of this vulnerability could cause a buffer overflow condition resulting in remote code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address. CVE-2022-1669 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-19-253-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 EXCESSIVE DATA QUERY OPERATIONS IN A LARGE DATA TABLE CWE-1049 The kernel can be forced to make very expensive calls for every incoming TCP Selective Acknowledgement (SACK) packet which can lead to a denial-of-service condition. CVE-2019-8460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 The kernel is affected by an integer overflow when handling TCP Selective Acknowledgements, which could allow a remote attacker to cause a denial-of-service condition. CVE-2019-11477 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.3 UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION')CWE-400 A remote attacker sending specially crafted TCP Selective Acknowledgment (SACK) sequences may cause a denial-of-service condition. CVE-2019-11478 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). 4.2.4 UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION')CWE-400 An attacker may exploit a vulnerability in the TCP retransmission queue implementation kernel when handling TCP Selective Acknowledgements (SACK) to cause a denial-of-service condition. CVE-2019-11479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of these vulnerabilities could cause denial-of-service condition.
4.2.1 EXCESSIVE DATA QUERY OPERATIONS IN A LARGE DATA TABLE CWE-1049 The kernel can be forced to make very expensive calls for every incoming TCP Selective Acknowledgement (SACK) packet which can lead to a denial-of-service condition. CVE-2019-8460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 The kernel is affected by an integer overflow when handling TCP Selective Acknowledgements, which could allow a remote attacker to cause a denial-of-service condition. CVE-2019-11477 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.3 UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION')CWE-400 A remote attacker sending specially crafted TCP Selective Acknowledgment (SACK) sequences may cause a denial-of-service condition. CVE-2019-11478 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). 4.2.4 UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION')CWE-400 An attacker may exploit a vulnerability in the TCP retransmission queue implementation kernel when handling TCP Selective Acknowledgements (SACK) to cause a denial-of-service condition. CVE-2019-11479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-20-105-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION (RESOURCE EXHAUSTION) CWE-400 The VxWorks-based PROFINET TCP stack can be forced to make resource-intense calls for every incoming packet, which can lead to a denial-of-service condition. CVE-2019-19301 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability can result in a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION (RESOURCE EXHAUSTION) CWE-400 The VxWorks-based PROFINET TCP stack can be forced to make resource-intense calls for every incoming packet, which can lead to a denial-of-service condition. CVE-2019-19301 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-20-105-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 BUSINESS LOGIC ERRORS CWE-840 The affected products could allow an attacker to change the IP address of the device to an invalid value. This may allow an attacker to make device configuration changes and affect its availability. CVE-2019-13939 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).
Successful exploitation of this vulnerability could allow an attacker to affect the availability and integrity of the device.
4.2.1 BUSINESS LOGIC ERRORS CWE-840 The affected products could allow an attacker to change the IP address of the device to an invalid value. This may allow an attacker to make device configuration changes and affect its availability. CVE-2019-13939 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices do not properly handle large numbers of incoming connections. An attacker may leverage this to cause a denial-of-service condition. CVE-2021-31340 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an unauthorized attacker to crash the OPC UA service of the affected devices.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices do not properly handle large numbers of incoming connections. An attacker may leverage this to cause a denial-of-service condition. CVE-2021-31340 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 4.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leaks, depending on a user-defined application that runs on top of the UDP protocol. CVE-2021-31345 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leaks and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31346 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.4 OUT-OF-BOUNDS READ CWE-125 When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to denial-of-service conditions. CVE-2021-31881 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.5 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to denial-of-service conditions. CVE-2021-31882 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.6 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to denial-of-service conditions. CVE-2021-31883 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.7 IMPROPER NULL TERMINATION CWE-170 The DHCP client application assumes the data supplied with the Hostname DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to out-of-bound reads, writes, and denial-of-service conditions. CVE-2021-31884 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.8 BUFFER ACCESS WITH INCORRECT LENGTH VALUE CWE-805 TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. CVE-2021-31885 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.9 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the USER command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31886 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.10 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the PWD/XPWD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31887 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.11 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the MKD/XMKD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31888 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.12 INTEGER UNDERFLOW (WRAP OR WRAPAROUND) CWE-191 Malformed TCP packets with a corrupted SACK option leads to denial-of-service conditions. CVE-2021-31889 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.13 IMPROPER HANDLING OF INCONSISTENT STRUCTURAL ELEMENTS CWE-240 The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31890 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow denial-of-service conditions, remote code execution, information leaks, and out-of-bounds reads and writes.
4.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 4.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leaks, depending on a user-defined application that runs on top of the UDP protocol. CVE-2021-31345 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leaks and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31346 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.4 OUT-OF-BOUNDS READ CWE-125 When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to denial-of-service conditions. CVE-2021-31881 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.5 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to denial-of-service conditions. CVE-2021-31882 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.6 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS CWE-119 When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to denial-of-service conditions. CVE-2021-31883 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.7 IMPROPER NULL TERMINATION CWE-170 The DHCP client application assumes the data supplied with the Hostname DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to out-of-bound reads, writes, and denial-of-service conditions. CVE-2021-31884 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.8 BUFFER ACCESS WITH INCORRECT LENGTH VALUE CWE-805 TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. CVE-2021-31885 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.9 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the USER command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31886 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.10 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the PWD/XPWD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31887 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.11 IMPROPER NULL TERMINATION CWE-170 FTP server does not properly validate the length of the MKD/XMKD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution. CVE-2021-31888 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.12 INTEGER UNDERFLOW (WRAP OR WRAPAROUND) CWE-191 Malformed TCP packets with a corrupted SACK option leads to denial-of-service conditions. CVE-2021-31889 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.13 IMPROPER HANDLING OF INCONSISTENT STRUCTURAL ELEMENTS CWE-240 The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31890 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. An attacker could exploit this vulnerability to introduce a buffer overflow that leads to memory corruption. CVE-2022-27242 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to trigger a memory corruption.
3.2.1 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. An attacker could exploit this vulnerability to introduce a buffer overflow that leads to memory corruption. CVE-2022-27242 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected application contains an out-of-bounds write past the end of an allocated structure while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. CVE-2022-27653 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could cause code execution if the affected application is used to open a malicious .NEU file.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected application contains an out-of-bounds write past the end of an allocated structure while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. CVE-2022-27653 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected devices improperly handle excessive ARP broadcast requests. This could allow an attacker to create a denial-of-service condition by performing ARP storming attacks, which can cause the device to reboot. CVE-2022-27640 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected devices improperly handle excessive ARP broadcast requests. This could allow an attacker to create a denial-of-service condition by performing ARP storming attacks, which can cause the device to reboot. CVE-2022-27640 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 LOOP WITH UNREACHABLE EXIT CONDITION (INFINITE LOOP) CWE-835 The Tiff_Loader.dll is vulnerable to infinite loop condition while parsing specially crafted TIFF files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29028 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.2 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29029 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.3 INTEGER OVERFLOW TO BUFFER OVERFLOW CWE-680 The Mono_Loader.dll library is vulnerable to integer overflow condition while parsing specially crafted TG4 files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29030 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.4 NULL POINTER DEREFERENCE CWE-476 The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. CVE-2022-29031 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.5 DOUBLE FREE CWE-415 The CGM_NIST_Loader.dll library contains a double free vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-29032 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.6 ACCESS OF UNINITIALIZED POINTER CWE-824 The CGM_NIST_Loader.dll library is vulnerable to uninitialized pointer free while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-29033 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to trick a user to open a malicious file (crafted as CGM, TIFF or TG4) with any of the affected products, which could lead the application to crash or to arbitrary code execution.
3.2.1 LOOP WITH UNREACHABLE EXIT CONDITION (INFINITE LOOP) CWE-835 The Tiff_Loader.dll is vulnerable to infinite loop condition while parsing specially crafted TIFF files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29028 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.2 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29029 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.3 INTEGER OVERFLOW TO BUFFER OVERFLOW CWE-680 The Mono_Loader.dll library is vulnerable to integer overflow condition while parsing specially crafted TG4 files. An attacker could leverage this vulnerability to crash the application and cause a denial-of-service condition. CVE-2022-29030 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.4 NULL POINTER DEREFERENCE CWE-476 The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. CVE-2022-29031 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.5 DOUBLE FREE CWE-415 The CGM_NIST_Loader.dll library contains a double free vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-29032 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.6 ACCESS OF UNINITIALIZED POINTER CWE-824 The CGM_NIST_Loader.dll library is vulnerable to uninitialized pointer free while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-29033 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command. CVE-2022-1357 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected On-Premise is vulnerable to data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate and dump all data held in the cnMaestro database. CVE-2022-1358 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected On-Premise cnMaestro is vulnerable to a pre-auth data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate data about other users accounts and devices. CVE-2022-1361 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings. CVE-2022-1360 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L). 3.2.5 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server. CVE-2022-1362 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). 3.2.6 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server. CVE-2022-1359 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). 3.2.7 USE OF POTENTIALLY DANGEROUS FUNCTION CWE-676 The affected product is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands. CVE-2022-1356 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to gain remote code execution, sensitive data exfiltration, and complete takeover of the main multi-tenant cloud infrastructure.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command. CVE-2022-1357 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected On-Premise is vulnerable to data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate and dump all data held in the cnMaestro database. CVE-2022-1358 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected On-Premise cnMaestro is vulnerable to a pre-auth data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate data about other users accounts and devices. CVE-2022-1361 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings. CVE-2022-1360 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L). 3.2.5 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server. CVE-2022-1362 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). 3.2.6 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server. CVE-2022-1359 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). 3.2.7 USE OF POTENTIALLY DANGEROUS FUNCTION CWE-676 The affected product is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands. CVE-2022-1356 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to have access to unauthorized information. CVE-2021-42700 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.2 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product can access an uninitialized pointer, which may allow an attacker to have access to unauthorized information. CVE-2021-42702 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.3 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to arbitrary execute code. CVE-2021-42704 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow unauthorized information disclosure and code execution.
3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to have access to unauthorized information. CVE-2021-42700 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.2 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product can access an uninitialized pointer, which may allow an attacker to have access to unauthorized information. CVE-2021-42702 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). 3.2.3 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to arbitrary execute code. CVE-2021-42704 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 The affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to cause a denial-of-service condition or to control the program counter and execute arbitrary code on the device. CVE-2022-29872 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 The affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to cause a denial-of-service condition or to control the program counter and execute arbitrary code on the device. CVE-2022-29873 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. CVE-2022-29874 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected cross-site scripting (XSS) attacks. CVE-2022-29876 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). 3.2.5 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the attacker achieves the role of authenticated administrator. CVE-2022-29877 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.6 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 The affected devices use a limited range for challenges sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user and request the webpage repeatedly to wait for the same challenge to reappear for the correct response to be revealed. This could allow the attacker to access the management interface of the device. CVE-2022-29878 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.7 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The web-based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information. CVE-2022-29879 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.8 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user who accesses the affected views. CVE-2022-29880 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L). 3.2.9 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The web-based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details. CVE-2022-29881 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.10 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this to store an XSS attack, which could (when a legitimate user accesses the error logs) perform arbitrary actions in the name of the user. CVE-2022-29882 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). 3.2.11 IMPROPER AUTHENTICATION CWE-287 The affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication. CVE-2022-29883 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Successful exploitation of these vulnerabilities could allow an attacker management interface access, traffic capture, interface with the functionality of the device, control of the program counter, cause a denial-of-service condition, loss of device information, and allow arbitrary code execution.
3.2.1 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 The affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to cause a denial-of-service condition or to control the program counter and execute arbitrary code on the device. CVE-2022-29872 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 The affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to cause a denial-of-service condition or to control the program counter and execute arbitrary code on the device. CVE-2022-29873 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. CVE-2022-29874 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected cross-site scripting (XSS) attacks. CVE-2022-29876 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). 3.2.5 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the attacker achieves the role of authenticated administrator. CVE-2022-29877 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.6 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 The affected devices use a limited range for challenges sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user and request the webpage repeatedly to wait for the same challenge to reappear for the correct response to be revealed. This could allow the attacker to access the management interface of the device. CVE-2022-29878 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.7 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The web-based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information. CVE-2022-29879 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). 3.2.8 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user who accesses the affected views. CVE-2022-29880 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L). 3.2.9 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The web-based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details. CVE-2022-29881 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.10 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this to store an XSS attack, which could (when a legitimate user accesses the error logs) perform arbitrary actions in the name of the user. CVE-2022-29882 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). 3.2.11 IMPROPER AUTHENTICATION CWE-287 The affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication. CVE-2022-29883 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHORIZATION CWE-862 Apache HTTP Server Versions 2.4.0 to 2.4.46 allow unprivileged local users to stop httpd on Windows. CVE-2020-13938 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 In Apache HTTP Server Versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow. CVE-2021-26691 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 NULL POINTER DEREFERENCE CWE-476 Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server Versions 2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker who can present SM2 content for decryption to an application could cause data to overflow the buffer up to a maximum of 62 bytes, altering the contents of other data held after the buffer or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1 (Affected 1.1.1-1.1.1k). This issue is detailed further in CVE-2021-3711. CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS WRITE CWE-787 A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for this vulnerability, though it might be possible to craft one. This issue affects Apache HTTP Server Versions 2.4.51 and earlier. CVE-2021-44790 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Apache HTTP Server Versions 2.4.52 and earlier fail to close inbound connections when errors are encountered discarding the request body, exposing the server to HTTP request smuggling. CVE-2022-22720 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7 OUT-OF-BOUNDS WRITE CWE-787 An out-of-bounds write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 Versions 2.4.52 and earlier. CVE-2022-23943 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop for non-prime moduli. An attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue, which is further detailed in CVE-2022-0778, affects OpenSSL Versions 1.0.2, 1.1.1, and 3.0.xxx CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could result in a denial-of-service condition, malicious program execution, information disclosure, information tampering, or authentication bypass.
3.2.1 MISSING AUTHORIZATION CWE-862 Apache HTTP Server Versions 2.4.0 to 2.4.46 allow unprivileged local users to stop httpd on Windows. CVE-2020-13938 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 In Apache HTTP Server Versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow. CVE-2021-26691 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 NULL POINTER DEREFERENCE CWE-476 Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server Versions 2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker who can present SM2 content for decryption to an application could cause data to overflow the buffer up to a maximum of 62 bytes, altering the contents of other data held after the buffer or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1 (Affected 1.1.1-1.1.1k). This issue is detailed further in CVE-2021-3711. CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS WRITE CWE-787 A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for this vulnerability, though it might be possible to craft one. This issue affects Apache HTTP Server Versions 2.4.51 and earlier. CVE-2021-44790 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Apache HTTP Server Versions 2.4.52 and earlier fail to close inbound connections when errors are encountered discarding the request body, exposing the server to HTTP request smuggling. CVE-2022-22720 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7 OUT-OF-BOUNDS WRITE CWE-787 An out-of-bounds write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 Versions 2.4.52 and earlier. CVE-2022-23943 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop for non-prime moduli. An attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue, which is further detailed in CVE-2022-0778, affects OpenSSL Versions 1.0.2, 1.1.1, and 3.0.xxx CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product does not properly sanitize input while processing a specific project file, allowing a possible stack-based buffer overflow condition. CVE-2022-1405 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. CVE-2022-1404 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
Successful exploitation of these vulnerabilities could allow arbitrary code execution or information disclosure.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product does not properly sanitize input while processing a specific project file, allowing a possible stack-based buffer overflow condition. CVE-2022-1405 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. CVE-2022-1404 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. CVE-2021-40360 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.2 INSERTION OF SENSITIVE INFORMATION INTO EXTERNALLY-ACCESSIBLE FILE OR DIRECTORY CWE-538 The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. CVE-2021-40363 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities may allow attackers to retrieve and brute force password hashes and access other systems.
4.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. CVE-2021-40360 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.2 INSERTION OF SENSITIVE INFORMATION INTO EXTERNALLY-ACCESSIBLE FILE OR DIRECTORY CWE-538 The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. CVE-2021-40363 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 NULL POINTER DEREFERENCE CWE-476 An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension, where it was present in the initial ClientHello, but includes a signature_algorithms_cert extension, then a NULL pointer dereference will occur, leading to a crash and a denial-of-service condition. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled, which is the default configuration. OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. This vulnerability is fixed in OpenSSL 1.1.1k. CVE-2021-3449 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated. the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Successful exploitation of this vulnerability may allow an unauthenticated attacker to cause a denial-of-service condition if a maliciously crafted renegotiation message is sent.
4.2.1 NULL POINTER DEREFERENCE CWE-476 An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension, where it was present in the initial ClientHello, but includes a signature_algorithms_cert extension, then a NULL pointer dereference will occur, leading to a crash and a denial-of-service condition. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled, which is the default configuration. OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. This vulnerability is fixed in OpenSSL 1.1.1k. CVE-2021-3449 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated. the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable due to an out-of-bounds read, which may allow an attacker to send specially crafted messages to disclose information on memory or cause a denial-of-service condition. CVE-2021-3712 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H). 3.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 The affected product is vulnerable due to an integer overflow, which may allow an attacker to cause a denial-of-service condition. CVE-2021-23840 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow a remote attacker to send specially crafted messages, resulting in information disclosure or a denial-of-service condition.
3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable due to an out-of-bounds read, which may allow an attacker to send specially crafted messages to disclose information on memory or cause a denial-of-service condition. CVE-2021-3712 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H). 3.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 The affected product is vulnerable due to an integer overflow, which may allow an attacker to cause a denial-of-service condition. CVE-2021-23840 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668 Windows OS can be configured to overlay a language bar on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS. CVE-2022-1467 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L).
Successful exploitation of this vulnerability could allow an authenticated user to escape from the context of the streamed application into the OS and launch arbitrary OS commands.
3.2.1 EXPOSURE OF RESOURCE TO WRONG SPHERE CWE-668 Windows OS can be configured to overlay a language bar on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS. CVE-2022-1467 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product is vulnerable to a reflected cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM software. An attacker would need access to the local subnet and an administrator interaction to compromise the system. CVE-2021-23282 has been assigned to this vulnerability. A CVSS v3 base score of 5.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code using untrusted data.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product is vulnerable to a reflected cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM software. An attacker would need access to the local subnet and an administrator interaction to compromise the system. CVE-2021-23282 has been assigned to this vulnerability. A CVSS v3 base score of 5.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product has reached its End of Life, it is vulnerable to a stored cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM Infrastructure software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23284 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product has reached its End of Life, it is vulnerable to a reflected cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM Infrastructure software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23285 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF FORMULA ELEMENTS IN A CSV FILE CWE-1236 The affected product has reached its End of Life, it is vulnerable to a CSV Formula Injection. The vulnerability exists due to improper sanitization of imported CSV files. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23286 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code using untrusted data.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product has reached its End of Life, it is vulnerable to a stored cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM Infrastructure software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23284 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product has reached its End of Life, it is vulnerable to a reflected cross-site scripting vulnerability due to insufficient validation of input from certain resources by the IPM Infrastructure software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23285 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF FORMULA ELEMENTS IN A CSV FILE CWE-1236 The affected product has reached its End of Life, it is vulnerable to a CSV Formula Injection. The vulnerability exists due to improper sanitization of imported CSV files. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. CVE-2021-23286 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product is vulnerable to a cross-site scripting vulnerability due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software. CVE-2021-23283 has been assigned to this vulnerability. A CVSS v3 base score of 5.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code using untrusted data.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product is vulnerable to a cross-site scripting vulnerability due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software. CVE-2021-23283 has been assigned to this vulnerability. A CVSS v3 base score of 5.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 FILES AND DIRECTORIES ACCESSIBLE TO EXTERNAL PARTIES CWE-552 The affected product is vulnerable to a MySQL database issue that allows an attacker to read database files. This may allow an attacker to read database credentials and steal data. CVE-2021-43008 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow reading of database credentials and loss of sensitive information.
3.2.1 FILES AND DIRECTORIES ACCESSIBLE TO EXTERNAL PARTIES CWE-552 The affected product is vulnerable to a MySQL database issue that allows an attacker to read database files. This may allow an attacker to read database credentials and steal data. CVE-2021-43008 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-125-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNVERIFIED PASSWORD CHANGE CWE-620 Under certain circumstances, an authenticated user could lock other users out of the system and take over accounts. CVE-2022-21934 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an authenticated user to lock other users out of the system and take over their accounts.
3.2.1 UNVERIFIED PASSWORD CHANGE CWE-620 Under certain circumstances, an authenticated user could lock other users out of the system and take over accounts. CVE-2022-21934 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-123-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A local attacker could tamper with files generated by the graphic builder, which may allow arbitrary programs to be executed on a computer that has installed standard operation and monitoring function (HIS). CVE-2022-27188 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H). 3.2.2 IMPROPER AUTHENTICATION CWE-287 Improper authentication of the communication protocol provided by the Automation Design (AD) server allows an attacker to use the functions provided by the AD server. This may lead to leakage or tampering of data managed by the AD server. CVE-2022-26034 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). 3.2.3 NULL POINTER DEREFERENCE CWE-476 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2019-0203 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 IMPROPER INPUT VALIDATION CWE-20 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2018-11782 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.5 RESOURCE MANAGEMENT ERRORS CWE-399 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2015-0248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of these vulnerabilities may allow leakage/tampering of data, cause a denial-of-service condition, or allow a local attacker to execute arbitrary programs.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A local attacker could tamper with files generated by the graphic builder, which may allow arbitrary programs to be executed on a computer that has installed standard operation and monitoring function (HIS). CVE-2022-27188 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H). 3.2.2 IMPROPER AUTHENTICATION CWE-287 Improper authentication of the communication protocol provided by the Automation Design (AD) server allows an attacker to use the functions provided by the AD server. This may lead to leakage or tampering of data managed by the AD server. CVE-2022-26034 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). 3.2.3 NULL POINTER DEREFERENCE CWE-476 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2019-0203 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 IMPROPER INPUT VALIDATION CWE-20 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2018-11782 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 3.2.5 RESOURCE MANAGEMENT ERRORS CWE-399 The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop. CVE-2015-0248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-118-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Under certain circumstances, an authenticated user could elevate their privileges to administrator. CVE-2021-36207 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an authenticated user to elevate their privileges to administrator.
3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Under certain circumstances, an authenticated user could elevate their privileges to administrator. CVE-2021-36207 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-116-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OBSERVABLE DISCREPANCY CWE-203 In affected OpenSSL versions, the Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker computing the pre-master secret in connections that have used a Diffie-Hellman-based ciphersuite. This allows the attacker to eavesdrop on all encrypted communications sent over that TLS connection. CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 UNCONTROLLED RECURSION CWE-674 In affected versions of OpenLDAP, LDAP search filters with nested boolean expressions can result in a denial-of-service condition. CVE-2020-12243 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 REACHABLE ASSERTION CWE-617 A flaw in affected versions of the OpenLDAP slapd server may cause an assertion failure when processing a malicious packet. This may lead to a denial-of-service condition. CVE-2020-25709 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 REACHABLE ASSERTION CWE-617 A flaw in affected versions of OpenLDAP allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23() function. This may lead to a denial-of-service condition. CVE-2020-25710 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 TYPE CONFUSION CWE-843 A flaw was discovered in ldap_X509dn2bv in affected OpenLDAP versions leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in a denial-of-service condition. CVE-2020-36229 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.6 REACHABLE ASSERTION CWE-617 A flaw was discovered in affected OpenLDAP versions leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in a denial-of-service condition. CVE-2020-36230 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 A flaw in affected versions of OpenSSL may cause calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate to overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. This could lead to applications behaving incorrectly. CVE-2021-23840 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic or to cause a denial-of-service condition.
3.2.1 OBSERVABLE DISCREPANCY CWE-203 In affected OpenSSL versions, the Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker computing the pre-master secret in connections that have used a Diffie-Hellman-based ciphersuite. This allows the attacker to eavesdrop on all encrypted communications sent over that TLS connection. CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 UNCONTROLLED RECURSION CWE-674 In affected versions of OpenLDAP, LDAP search filters with nested boolean expressions can result in a denial-of-service condition. CVE-2020-12243 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 REACHABLE ASSERTION CWE-617 A flaw in affected versions of the OpenLDAP slapd server may cause an assertion failure when processing a malicious packet. This may lead to a denial-of-service condition. CVE-2020-25709 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.4 REACHABLE ASSERTION CWE-617 A flaw in affected versions of OpenLDAP allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23() function. This may lead to a denial-of-service condition. CVE-2020-25710 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.5 TYPE CONFUSION CWE-843 A flaw was discovered in ldap_X509dn2bv in affected OpenLDAP versions leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in a denial-of-service condition. CVE-2020-36229 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.6 REACHABLE ASSERTION CWE-617 A flaw was discovered in affected OpenLDAP versions leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in a denial-of-service condition. CVE-2020-36230 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 A flaw in affected versions of OpenSSL may cause calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate to overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. This could lead to applications behaving incorrectly. CVE-2021-23840 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OBSERVABLE DISCREPANCY CWE-203 The Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. This would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note this vulnerability only impacts DH ciphersuites and not ECDH ciphersuites. This vulnerability affects OpenSSL 1.0.2, which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v). CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling. CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling. CVE-2020-8287 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.4 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack is possible due to a bug in processing of carrier-return symbols in the HTTP header names. CVE-2020-8201 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.5 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes. CVE-2020-8252 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.6 IMPROPER CERTIFICATE VALIDATION CWE-295 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. CVE-2020-8172 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.7 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0. CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A vulnerability was found in postgresql in versions prior to 13.3, 12.7, 11.12, 10.17, and 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.9 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.
3.2.1 OBSERVABLE DISCREPANCY CWE-203 The Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. This would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note this vulnerability only impacts DH ciphersuites and not ECDH ciphersuites. This vulnerability affects OpenSSL 1.0.2, which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v). CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.2 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling. CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling. CVE-2020-8287 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.4 INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST SMUGGLING') CWE-444 Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack is possible due to a bug in processing of carrier-return symbols in the HTTP header names. CVE-2020-8201 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.5 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes. CVE-2020-8252 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.6 IMPROPER CERTIFICATE VALIDATION CWE-295 TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0. CVE-2020-8172 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 3.2.7 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0. CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A vulnerability was found in postgresql in versions prior to 13.3, 12.7, 11.12, 10.17, and 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.9 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 The affected product may allow an attacker to identify and forge requests to internal systems by way of a specially crafted request. CVE-2021-36203 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to identify and forge requests to internal systems via a specially crafted request, allowing an attacker to determine whether specific files or paths exist.
3.2.1 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 The affected product may allow an attacker to identify and forge requests to internal systems by way of a specially crafted request. CVE-2021-36203 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. CVE-2022-1402 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds write condition. CVE-2022-1403 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities may allow arbitrary code execution.
3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. CVE-2022-1402 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected product does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds write condition. CVE-2022-1403 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Media Tek LinkIt SDK versions prior to 4.6.1 is vulnerable to integer overflow in memory allocation calls pvPortCalloc(calloc) and pvPortRealloc(realloc), which can lead to memory corruption on the target device. CVE-2021-30636 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM CMSIS RTOS2 versions prior to 2.1.3 are vulnerable to integer wrap-around inosRtxMemoryAlloc (local malloc equivalent) function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution. CVE-2021-27431 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.3 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM mbed-ualloc memory library Version 1.3.0 is vulnerable to integer wrap-around in function mbed_krbs, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27433 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.4 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM mbed product Version 6.3.0 is vulnerable to integer wrap-around in malloc_wrapper function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27435 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.5 INTEGER OVERFLOW OR WRAPAROUND CWE-190 RIOT OS Versions 2020.01.1 is vulnerable to integer wrap-around in its implementation of calloc function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27427 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.6 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Samsung Tizen RT RTOS version 3.0.GBB is vulnerable to integer wrap-around in functions_calloc and mm_zalloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash. CVE-2021-22684 has been assigned to this vulnerability. A CVSS v3 base score of 3.2 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L). 4.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 TencentOS-tiny Version 3.1.0 is vulnerable to integer wrap-around in function 'tos_mmheap_alloc incorrect calculation of effective memory allocation size. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27439 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.8 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Cesanta Software Mongoose-OS v2.17.0 is vulnerable to integer wrap-around in function mm_malloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27425 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.9 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Apache Nuttx OS Version 9.1.0 is vulnerable to integer wrap-around in functions malloc, realloc and memalign. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-26461 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.10 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Wind River VxWorks several versions prior to 7.0 firmware are vulnerable to weaknesses found in the following functions; calloc(memLib), mmap/mmap64 (mmanLib), cacheDmaMalloc(cacheLib) and cacheArchDmaMalloc(cacheArchLib). This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2020-35198 and CVE-2020-28895 have been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.11 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Amazon FreeRTOS Version 10.4.1 is vulnerable to integer wrap-around in multiple memory management API functions (MemMang, Queue, StreamBuffer). This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-31571 and CVE-2021-31572 have been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.12 INTEGER OVERFLOW OR WRAPAROUND CWE-190 eCosCentric eCosPro RTOS Versions 2.0.1 through 4.5.3 are vulnerable to integer wraparound in function calloc (an implementation of malloc). The unverified memory assignment can lead to arbitrary memory allocation, resulting in a heap-based buffer overflow. CVE-2021-27417 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H). 4.2.13 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Redhat newlib versions prior to 4.0.0 are vulnerable to integer wrap-around in malloc and nano-malloc family routines (memalign, valloc, pvalloc, nano_memalign, nano_valloc, nano_pvalloc) due to insufficient checking in memory alignment logic. This insufficient checking can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-3420 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.14 INTEGER OVERFLOW OR WRAPAROUND CWE-190 NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc. CVE-2021-27421 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.15 INTEGER OVERFLOW OR WRAPAROUND CWE-190 NXP MQX Versions 5.1 and prior are vulnerable to integer overflow in mem_alloc, _lwmem_alloc and _partition functions. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-22680 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.16 INTEGER OVERFLOW OR WRAPAROUND CWE-190 uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27419 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.17 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values. This can trigger an integer overflow vulnerability in 'HeapTrack_alloc' and result in code execution. CVE-2021-27429 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.18 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' and result in code execution. CVE-2021-22636 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.19 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution. CVE-2021-27504 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.20 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution. CVE-2021-27502 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.21 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Google Cloud IoT Device SDK Version 1.0.2 is vulnerable to heap overflow due to integer overflow in its implementation of calloc, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or code execution. Google PSIRT will assign a CVE. CVSS score will be calculated when a CVE has been assigned. 4.2.22 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Micrium OS Versions 5.10.1 and prior are vulnerable to integer wrap-around in functions Mem_DynPoolCreate, Mem_DynPoolCreateHW and Mem_PoolCreate. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as very small blocks of memory being allocated instead of very large ones. CVE-2021-27411 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L). 4.2.23 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Micrium uC/OS: uC/LIB Versions 1.38.xx, 1.39.00 are vulnerable to integer wrap-around in functions Mem_DynPoolCreate, Mem_DynPoolCreateHW and Mem_PoolCreate. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as very small blocks of memory being allocated instead of very large ones. CVE-2021-26706 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H). 4.2.24 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Zephyr Project RTOS versions prior to 2.5 are vulnerable to integer wrap-around sys_mem_pool_alloc function, which can lead to arbitrary memory allocation resulting in unexpected behavior such as a crash or code execution. CVE-2020-13603 has been assigned to this vulnerability. A CVSS v3 base score of 6.9 has been calculated; the CVSS vector string is (AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). 4.2.25 INTEGER OVERFLOW OR WRAPAROUND CWE-190 BlackBerry QNX SDP Versions 6.5.0 SP1 and earlier, QNX OS for Safety Versions 1.0.1 and earlier, QNX OS for Medical Versions 1.1, and other products are vulnerable to integer wrap-around in the calloc( ) C runtime function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution. CVE-2021-22156 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could result in unexpected behavior such as a crash or a remote code injection/execution.
4.2.1 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Media Tek LinkIt SDK versions prior to 4.6.1 is vulnerable to integer overflow in memory allocation calls pvPortCalloc(calloc) and pvPortRealloc(realloc), which can lead to memory corruption on the target device. CVE-2021-30636 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.2 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM CMSIS RTOS2 versions prior to 2.1.3 are vulnerable to integer wrap-around inosRtxMemoryAlloc (local malloc equivalent) function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution. CVE-2021-27431 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.3 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM mbed-ualloc memory library Version 1.3.0 is vulnerable to integer wrap-around in function mbed_krbs, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27433 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.4 INTEGER OVERFLOW OR WRAPAROUND CWE-190 ARM mbed product Version 6.3.0 is vulnerable to integer wrap-around in malloc_wrapper function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27435 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.5 INTEGER OVERFLOW OR WRAPAROUND CWE-190 RIOT OS Versions 2020.01.1 is vulnerable to integer wrap-around in its implementation of calloc function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27427 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.6 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Samsung Tizen RT RTOS version 3.0.GBB is vulnerable to integer wrap-around in functions_calloc and mm_zalloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash. CVE-2021-22684 has been assigned to this vulnerability. A CVSS v3 base score of 3.2 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L). 4.2.7 INTEGER OVERFLOW OR WRAPAROUND CWE-190 TencentOS-tiny Version 3.1.0 is vulnerable to integer wrap-around in function 'tos_mmheap_alloc incorrect calculation of effective memory allocation size. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27439 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.8 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Cesanta Software Mongoose-OS v2.17.0 is vulnerable to integer wrap-around in function mm_malloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27425 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.9 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Apache Nuttx OS Version 9.1.0 is vulnerable to integer wrap-around in functions malloc, realloc and memalign. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-26461 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.10 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Wind River VxWorks several versions prior to 7.0 firmware are vulnerable to weaknesses found in the following functions; calloc(memLib), mmap/mmap64 (mmanLib), cacheDmaMalloc(cacheLib) and cacheArchDmaMalloc(cacheArchLib). This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2020-35198 and CVE-2020-28895 have been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.11 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Amazon FreeRTOS Version 10.4.1 is vulnerable to integer wrap-around in multiple memory management API functions (MemMang, Queue, StreamBuffer). This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-31571 and CVE-2021-31572 have been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.12 INTEGER OVERFLOW OR WRAPAROUND CWE-190 eCosCentric eCosPro RTOS Versions 2.0.1 through 4.5.3 are vulnerable to integer wraparound in function calloc (an implementation of malloc). The unverified memory assignment can lead to arbitrary memory allocation, resulting in a heap-based buffer overflow. CVE-2021-27417 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H). 4.2.13 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Redhat newlib versions prior to 4.0.0 are vulnerable to integer wrap-around in malloc and nano-malloc family routines (memalign, valloc, pvalloc, nano_memalign, nano_valloc, nano_pvalloc) due to insufficient checking in memory alignment logic. This insufficient checking can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-3420 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.14 INTEGER OVERFLOW OR WRAPAROUND CWE-190 NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc. CVE-2021-27421 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.15 INTEGER OVERFLOW OR WRAPAROUND CWE-190 NXP MQX Versions 5.1 and prior are vulnerable to integer overflow in mem_alloc, _lwmem_alloc and _partition functions. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-22680 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.16 INTEGER OVERFLOW OR WRAPAROUND CWE-190 uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. CVE-2021-27419 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.17 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values. This can trigger an integer overflow vulnerability in 'HeapTrack_alloc' and result in code execution. CVE-2021-27429 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.18 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' and result in code execution. CVE-2021-22636 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.19 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution. CVE-2021-27504 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.20 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution. CVE-2021-27502 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.21 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Google Cloud IoT Device SDK Version 1.0.2 is vulnerable to heap overflow due to integer overflow in its implementation of calloc, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or code execution. Google PSIRT will assign a CVE. CVSS score will be calculated when a CVE has been assigned. 4.2.22 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Micrium OS Versions 5.10.1 and prior are vulnerable to integer wrap-around in functions Mem_DynPoolCreate, Mem_DynPoolCreateHW and Mem_PoolCreate. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as very small blocks of memory being allocated instead of very large ones. CVE-2021-27411 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L). 4.2.23 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Micrium uC/OS: uC/LIB Versions 1.38.xx, 1.39.00 are vulnerable to integer wrap-around in functions Mem_DynPoolCreate, Mem_DynPoolCreateHW and Mem_PoolCreate. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as very small blocks of memory being allocated instead of very large ones. CVE-2021-26706 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H). 4.2.24 INTEGER OVERFLOW OR WRAPAROUND CWE-190 Zephyr Project RTOS versions prior to 2.5 are vulnerable to integer wrap-around sys_mem_pool_alloc function, which can lead to arbitrary memory allocation resulting in unexpected behavior such as a crash or code execution. CVE-2020-13603 has been assigned to this vulnerability. A CVSS v3 base score of 6.9 has been calculated; the CVSS vector string is (AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). 4.2.25 INTEGER OVERFLOW OR WRAPAROUND CWE-190 BlackBerry QNX SDP Versions 6.5.0 SP1 and earlier, QNX OS for Safety Versions 1.0.1 and earlier, QNX OS for Medical Versions 1.1, and other products are vulnerable to integer wrap-around in the calloc( ) C runtime function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution. CVE-2021-22156 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).