All the vulnerabilites related to MEIKYO ELECTRIC CO.,LTD. - SignageRebooter RPC-M4HSi
jvndb-2022-000028
Vulnerability from jvndb
Published
2022-05-09 14:31
Modified
2024-06-19 15:55
Severity ?
Summary
Multiple vulnerabilities in multiple MEIKYO ELECTRIC products
Details
Multiple MEIKYO ELECTRIC products provided by MEIKYO ELECTRIC CO.,LTD. contain multiple vulnerabilities listed below.
* Cross-site request forgery (CWE-352) - CVE-2022-27632
* Cross-site scripting (CWE-79) - CVE-2022-28717
Takayuki Sasaki of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN58266015/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-27632 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-28717 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-27632 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-28717 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000028.html", "dc:date": "2024-06-19T15:55+09:00", "dcterms:issued": "2022-05-09T14:31+09:00", "dcterms:modified": "2024-06-19T15:55+09:00", "description": "Multiple MEIKYO ELECTRIC products provided by MEIKYO ELECTRIC CO.,LTD. contain multiple vulnerabilities listed below.\r\n\r\n * Cross-site request forgery (CWE-352) - CVE-2022-27632\r\n * Cross-site scripting (CWE-79) - CVE-2022-28717\r\n\r\nTakayuki Sasaki of Yokohama National University reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000028.html", "sec:cpe": [ { "#text": "cpe:/o:meikyo:poe_boot_nino_poe8m2_firmware", "@product": "PoE BOOT nino PoE8M2", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:pose_se10-8a7b1_firmware", "@product": "POSE SE10-8A7B1", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:signage_rebooter_rpc-m4hsi_firmware", "@product": "SignageRebooter RPC-M4HSi", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:time_boot_mini_rsc-mt4hs_firmware", "@product": "TIME BOOT mini RSC-MT4HS", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:time_boot_mini_rsc-mt4h_firmware", "@product": "TIME BOOT mini RSC-MT4H", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:time_boot_rsc-mt8fp_firmware", "@product": "TIME BOOT RSC-MT8FP", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:time_boot_rsc-mt8fs_firmware", "@product": "TIME BOOT RSC-MT8FS", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:time_boot_rsc-mt8f_firmware", "@product": "TIME BOOT RSC-MT8F", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_l-zero_rpc-m4ls_firmware", "@product": "WATCH BOOT L-zero RPC-M4LS", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_l-zero_rpc-m4l_firmware", "@product": "WATCH BOOT L-zero RPC-M4L", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_light_rpc-m5cs_firmware", "@product": "WATCH BOOT light RPC-M5CS", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_light_rpc-m5c_firmware", "@product": "WATCH BOOT light RPC-M5C", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_mini_rpc-m4h_firmware", "@product": "WATCH BOOT mini RPC-M4H", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_nino_rpc-m2cs_firmware", "@product": "WATCH BOOT nino RPC-M2CS", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" }, { "#text": "cpe:/o:meikyo:watch_boot_nino_rpc-m2c_firmware", "@product": "WATCH BOOT nino RPC-M2C", "@vendor": "MEIKYO ELECTRIC CO.,LTD.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:P", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000028", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN58266015/index.html", "@id": "JVN#58266015", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-27632", "@id": "CVE-2022-27632", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-28717", "@id": "CVE-2022-28717", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-27632", "@id": "CVE-2022-27632", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-28717", "@id": "CVE-2022-28717", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in multiple MEIKYO ELECTRIC products" }