Search criteria
3 vulnerabilities found for ipcom_ex_sc_1300_firmware by fujitsu
FKIE_CVE-2022-29516
Vulnerability from fkie_nvd - Published: 2022-05-18 15:15 - Updated: 2024-11-21 06:59
Severity ?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE289B4-8FA5-4EB3-A721-6D0C50BE542B",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFB4EA7-7AC7-4ECA-9B8B-AFBE904F257D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D44F35-F39A-4C5C-8B06-007935BEF323",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC0E35D-B3EB-4926-8220-F30FE9B5C54E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2D13DE-65D4-47A7-B0BF-F062F8779909",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87721AF6-D878-4C04-87E8-58994C39335C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46034667-FE75-44E9-B0D6-1D38CD7EC665",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A00DF6-7BDB-4459-8F54-9F8183AFE6B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F85C088-B5B5-4158-AF86-96895E932E1D",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70AEB89-7AB9-4B42-A97B-380E8D9245DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F19896-FD0E-4237-BEE0-80A2C05B7E3E",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42386DF-D819-4101-BB4A-3C4A905947E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBBE5CE-DDD9-4BA8-A74B-8F448EB43960",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C09756D-E6B5-4A8C-9C35-69683965E17B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20FEB55E-18DF-49CB-A791-0F54EF94EF22",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AEF78E-78D6-4668-A3EC-85A700B561AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30A2D1C6-94E5-49CC-B323-54906E123F16",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724D4C66-A53A-4293-8BF8-41136A3FC96B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C992F3A3-286C-41E2-B144-880085B97AC2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B74FDFA-1B29-4817-913D-6B283FC70118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD0393D-9C33-4F0D-BBA6-4D85FB422FAB",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749541B1-9447-41DB-B507-3C25923C8056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DD74E8-10AC-40A5-BFE8-AFB72135B6C2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038815A3-3810-408E-B89B-80C5E47272D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42DD45C6-D887-4282-8420-E1ABAB0362BD",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BC4CF-A11A-4681-AFFD-E4574A02F0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB43C56-7142-472B-B047-7B252EAE0E91",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD94E19-5A80-4752-A70C-88DB73696DAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "569BB6F8-B75A-4802-B902-3ED7AFE6F104",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBF85FA-E3A7-4DAD-9A72-778B6CAB9A27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76527386-16BF-46C8-99B1-8498EB116464",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D88ED1-096F-4BCC-9D5E-F4FCD6487681",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8547D5-8296-4ED4-AC98-A8140A9479EE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74FAF58B-753A-47C3-B497-06581D1073CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8514D111-015A-412A-A952-6C852C98C388",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F641180E-0FC3-4829-BC4B-B8FBA08F3F4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "714DF830-556B-4895-868D-D509C15FCDD1",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0603FF0-A7B2-47A0-BF33-8BE7609EC801",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB9BEFB-EB0E-4EFA-AF08-7F623B41978F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9183E9-1FE2-4575-847D-693B2FCEC309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22B32B0A-C422-48A3-980A-182ADEDDEB49",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53621B41-65BE-4C6D-8D0D-222FD9DDB8E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFF10E3-C6EB-41EA-82F6-112893EFD216",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87924DC9-3834-4E02-AC5E-480CB31563A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932DD6B4-B851-4E91-84B7-58F022538252",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5768179-59D5-453E-84FA-E65CB2571499",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "440796EF-4D9C-429C-A0FF-F12C571B6A7E",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C035FCFA-8F72-4571-8A09-376969DC2104",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA5A617-850B-4304-AF74-A98C18693DFA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4914D5A-F77A-49DF-805A-CC504A99BDF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2B7F2B-1C3C-4113-8CAF-20C19A5295CF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF98F841-8228-417A-A893-D903C197C2EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA683D7-2BAF-429A-BB72-32210DC645EF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87E0BB-EF22-4C8B-AF75-94FE7F8F3E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4BDFCF-E16C-4C9C-9C8B-6ECF3455ECB2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE83610C-71A0-4499-8EFC-3B5067D45300",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB4FC38-1B64-45A5-87BD-81E8673B9B81",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3DA3B6-33E2-47F7-A371-096399D8349A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABF31BE-515E-4158-A699-8FF54EF465A4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "146B18B6-F223-40C4-BE4C-EFD1D1B9DDAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64E678D2-8894-4FEA-A86E-873475E2ADD4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767F1B68-E671-4DCA-AE92-F4D6D1667DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC30935-8489-493A-9101-F943EEF107DE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "145A053B-2611-441A-B369-A9D7358AF452",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67CBFE07-3C37-47C5-911C-7BCB42CD732C",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC847DF6-0FB4-498F-9E6A-E9277BEFAF8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24F5C4-CA5A-4627-8E54-4875DF60F950",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2672DF0-E57F-4BD6-A1E7-48923F99E488",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5D35DC-C63F-4D34-993D-03C82D064B1F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FEF791-A685-4036-8B65-94D00C344AD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13A07CEF-AED7-441D-9E12-5544D61BD91D",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "239A61B6-1F0B-4B80-91E5-372E0F9D9542",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "865585F2-F6FF-46DF-92C8-8AAE46F5BFB3",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4105E5B6-6E70-4E4A-B339-725CF8EB7DF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FA0305-AAD2-4EC0-9E39-991F77D4F088",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3CB421-17F7-4A57-A64C-2C0ACDF54336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D23694DC-EE06-41FB-AB56-DC2C4C7A93CB",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E24C7-5A1F-4CC8-8553-A78DF56DAFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8D6766-50EC-47FF-9F50-4694DD7D041A",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37782E15-4803-4A46-B977-AC8F476EA812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2AB8056-998B-41AA-89C8-044C158D9534",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "195C8A73-78F6-4DEB-A45C-47656691D917",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E515941E-8711-4589-BA51-56E06091269B",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80B9786F-00BF-4212-93A3-D26919F78A7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9882F123-DD49-440F-93F0-57EC1F77F8E4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7D04BB-CFBC-4987-AB91-D6C84D69EBB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC7A51E-343B-4493-A404-4786FF2902C2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2D40A-0141-45BF-9058-D9EC91826118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A216376D-CF93-4C72-ABA6-A2A9A43717FA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11684682-AC1F-4270-AEA0-9D1324FE3B9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B29069DF-F116-45C5-8EC8-A03AAE9D7135",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "632309EF-EB1A-4349-9A47-633F6FEA6868",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
},
{
"lang": "es",
"value": "La consola web de la serie IPCOM de FUJITSU Network (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), e IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) permite a un atacante remoto ejecutar un comando arbitrario del sistema operativo por medio de vectores no especificados"
}
],
"id": "CVE-2022-29516",
"lastModified": "2024-11-21T06:59:14.480",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-18T15:15:10.123",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-29516 (GCVE-0-2022-29516)
Vulnerability from cvelistv5 – Published: 2022-05-18 09:50 – Updated: 2024-08-03 06:26
VLAI?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FUJITSU LIMITED | IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series |
Affected:
IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"vendor": "FUJITSU LIMITED",
"versions": [
{
"status": "affected",
"version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-18T09:50:24",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-29516",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"version": {
"version_data": [
{
"version_value": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
}
]
},
"vendor_name": "FUJITSU LIMITED"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/",
"refsource": "MISC",
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN96561229/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-29516",
"datePublished": "2022-05-18T09:50:24",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:26:06.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-29516 (GCVE-0-2022-29516)
Vulnerability from nvd – Published: 2022-05-18 09:50 – Updated: 2024-08-03 06:26
VLAI?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FUJITSU LIMITED | IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series |
Affected:
IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"vendor": "FUJITSU LIMITED",
"versions": [
{
"status": "affected",
"version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-18T09:50:24",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-29516",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"version": {
"version_data": [
{
"version_value": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
}
]
},
"vendor_name": "FUJITSU LIMITED"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/",
"refsource": "MISC",
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN96561229/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-29516",
"datePublished": "2022-05-18T09:50:24",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:26:06.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}