Search criteria
6 vulnerabilities found for ipcom_ve2_ls_plus2_200_firmware by fujitsu
FKIE_CVE-2024-39921
Vulnerability from fkie_nvd - Published: 2024-09-04 03:15 - Updated: 2025-03-13 14:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN29238389/ | Mitigation, Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/ | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F33CCD4D-E55C-4B95-8AB0-32FD36482F14",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC847DF6-0FB4-498F-9E6A-E9277BEFAF8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACBF242-4C29-4DD2-AD23-BC9356377286",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2672DF0-E57F-4BD6-A1E7-48923F99E488",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC14544-DF17-4BAD-98E8-64ACEDA96091",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FEF791-A685-4036-8B65-94D00C344AD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "522288AD-5175-4F19-BF23-D4EEF1E3CE3F",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "239A61B6-1F0B-4B80-91E5-372E0F9D9542",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5338A67-DEC0-442F-8C28-9A0BC2906797",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4105E5B6-6E70-4E4A-B339-725CF8EB7DF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FF3704-C3BF-44BB-9BBA-1BFA242F1503",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3CB421-17F7-4A57-A64C-2C0ACDF54336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D51F4578-7896-4C8D-A5A3-808B8C3C228E",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E24C7-5A1F-4CC8-8553-A78DF56DAFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "121F16FA-ADB2-4A14-9001-0A173F01EBA1",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37782E15-4803-4A46-B977-AC8F476EA812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8041853-1E56-43FC-8C00-334C55F4DC42",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2D40A-0141-45BF-9058-D9EC91826118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A96DE914-28DE-4FB9-9E56-0C038818A7CE",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11684682-AC1F-4270-AEA0-9D1324FE3B9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5DCD75-A9C2-4FC8-8E37-CAD58B570445",
"versionEndIncluding": "v01l06nf0112",
"versionStartIncluding": "v01l04nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "632309EF-EB1A-4349-9A47-633F6FEA6868",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "427446D3-CF6D-47B3-9EB1-42D1499D9169",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D32779B2-1953-42AA-84CC-9FB8A60D4DCE",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850AF6C2-1B57-40F4-8DE5-7BA678940FAF",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749541B1-9447-41DB-B507-3C25923C8056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6834BE51-4F83-47D7-9078-55CE715DB9E1",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9335DA00-53AD-4FA6-A105-C544B0A7F5C1",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26FFBA82-8A98-4791-9D29-6BD4D01D43FF",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038815A3-3810-408E-B89B-80C5E47272D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "684511EB-FCF1-46C7-8AFF-829C4E1F0306",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21AF154C-6572-41E5-A4F1-A70DB59C78C3",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "521D2E3B-3624-47D4-A93F-5386859AD256",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724D4C66-A53A-4293-8BF8-41136A3FC96B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3172D936-A418-4329-9FC6-E2152BE7CB90",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CBC251-E0FC-4ECF-A6B2-DE9A28F63E96",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC3CFF0-9A53-4334-9C24-6CE64FB1E108",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AEF78E-78D6-4668-A3EC-85A700B561AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDB8FD1-7252-4A53-A139-E810E04D8644",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "471F87B1-067B-48CF-934E-14B8B5448B09",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96163B7D-834F-4FDF-8337-3016E0CB5550",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42386DF-D819-4101-BB4A-3C4A905947E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE628AE-749E-43B9-99EF-22F431A57115",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20993B20-3FCA-49CC-930A-73178A52D369",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3E90AD-253B-4A68-A1A3-B07E6DE57B81",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70AEB89-7AB9-4B42-A97B-380E8D9245DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD20DCA-7300-476A-A67E-36E97FE675BE",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E9AA9B-800A-43B2-88CB-96199BBE81B2",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB984FA-37A6-4233-8508-B9F774CEFDB5",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD94E19-5A80-4752-A70C-88DB73696DAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88A97F3B-7521-44FB-AAC9-406397D4C5E7",
"versionEndIncluding": "v01l06nf0401",
"versionStartIncluding": "v01l02nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5C21EC-F232-4CF9-A6E8-C391D8DD9F54",
"versionEndIncluding": "v01l20nf0401",
"versionStartIncluding": "v01l20nf0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB3AE73-5A32-43E9-AF3F-BE1B971AA031",
"versionEndIncluding": "v02l21nf0301",
"versionStartIncluding": "v02l20nf0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BC4CF-A11A-4681-AFFD-E4574A02F0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
},
{
"lang": "es",
"value": "Existe un problema de discrepancia de tiempo observable en las series IPCOM EX2 V01L02NF0001 a V01L06NF0401, V01L20NF0001 a V01L20NF0401, V02L20NF0001 a V02L21NF0301 y en las series IPCOM VE2 V01L04NF0001 a V01L06NF0112. Si se explota esta vulnerabilidad, un atacante puede descifrar parte de la comunicaci\u00f3n cifrada y obtener el contenido de la misma."
}
],
"id": "CVE-2024-39921",
"lastModified": "2025-03-13T14:15:29.073",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-09-04T03:15:03.300",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN29238389/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-29516
Vulnerability from fkie_nvd - Published: 2022-05-18 15:15 - Updated: 2024-11-21 06:59
Severity ?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE289B4-8FA5-4EB3-A721-6D0C50BE542B",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFB4EA7-7AC7-4ECA-9B8B-AFBE904F257D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D44F35-F39A-4C5C-8B06-007935BEF323",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC0E35D-B3EB-4926-8220-F30FE9B5C54E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_nw_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2D13DE-65D4-47A7-B0BF-F062F8779909",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_nw_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87721AF6-D878-4C04-87E8-58994C39335C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46034667-FE75-44E9-B0D6-1D38CD7EC665",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A00DF6-7BDB-4459-8F54-9F8183AFE6B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F85C088-B5B5-4158-AF86-96895E932E1D",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A70AEB89-7AB9-4B42-A97B-380E8D9245DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_sc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F19896-FD0E-4237-BEE0-80A2C05B7E3E",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_sc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42386DF-D819-4101-BB4A-3C4A905947E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBBE5CE-DDD9-4BA8-A74B-8F448EB43960",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C09756D-E6B5-4A8C-9C35-69683965E17B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20FEB55E-18DF-49CB-A791-0F54EF94EF22",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AEF78E-78D6-4668-A3EC-85A700B561AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_lb_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30A2D1C6-94E5-49CC-B323-54906E123F16",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_lb_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724D4C66-A53A-4293-8BF8-41136A3FC96B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C992F3A3-286C-41E2-B144-880085B97AC2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B74FDFA-1B29-4817-913D-6B283FC70118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD0393D-9C33-4F0D-BBA6-4D85FB422FAB",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749541B1-9447-41DB-B507-3C25923C8056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_in_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DD74E8-10AC-40A5-BFE8-AFB72135B6C2",
"versionEndExcluding": "v01l05_nf0501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_in_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038815A3-3810-408E-B89B-80C5E47272D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42DD45C6-D887-4282-8420-E1ABAB0362BD",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BC4CF-A11A-4681-AFFD-E4574A02F0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex2_dc_3200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB43C56-7142-472B-B047-7B252EAE0E91",
"versionEndExcluding": "v02l21_nf0201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex2_dc_3200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD94E19-5A80-4752-A70C-88DB73696DAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "569BB6F8-B75A-4802-B902-3ED7AFE6F104",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBF85FA-E3A7-4DAD-9A72-778B6CAB9A27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76527386-16BF-46C8-99B1-8498EB116464",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D88ED1-096F-4BCC-9D5E-F4FCD6487681",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_in_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8547D5-8296-4ED4-AC98-A8140A9479EE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_in_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74FAF58B-753A-47C3-B497-06581D1073CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8514D111-015A-412A-A952-6C852C98C388",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F641180E-0FC3-4829-BC4B-B8FBA08F3F4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "714DF830-556B-4895-868D-D509C15FCDD1",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0603FF0-A7B2-47A0-BF33-8BE7609EC801",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB9BEFB-EB0E-4EFA-AF08-7F623B41978F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9183E9-1FE2-4575-847D-693B2FCEC309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22B32B0A-C422-48A3-980A-182ADEDDEB49",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53621B41-65BE-4C6D-8D0D-222FD9DDB8E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_lb_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFF10E3-C6EB-41EA-82F6-112893EFD216",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_lb_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87924DC9-3834-4E02-AC5E-480CB31563A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932DD6B4-B851-4E91-84B7-58F022538252",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5768179-59D5-453E-84FA-E65CB2571499",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "440796EF-4D9C-429C-A0FF-F12C571B6A7E",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C035FCFA-8F72-4571-8A09-376969DC2104",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA5A617-850B-4304-AF74-A98C18693DFA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4914D5A-F77A-49DF-805A-CC504A99BDF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2B7F2B-1C3C-4113-8CAF-20C19A5295CF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF98F841-8228-417A-A893-D903C197C2EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_sc_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA683D7-2BAF-429A-BB72-32210DC645EF",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_sc_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87E0BB-EF22-4C8B-AF75-94FE7F8F3E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4BDFCF-E16C-4C9C-9C8B-6ECF3455ECB2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE83610C-71A0-4499-8EFC-3B5067D45300",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB4FC38-1B64-45A5-87BD-81E8673B9B81",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3DA3B6-33E2-47F7-A371-096399D8349A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABF31BE-515E-4158-A699-8FF54EF465A4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "146B18B6-F223-40C4-BE4C-EFD1D1B9DDAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64E678D2-8894-4FEA-A86E-873475E2ADD4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767F1B68-E671-4DCA-AE92-F4D6D1667DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ex_nw_2700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC30935-8489-493A-9101-F943EEF107DE",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ex_nw_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "145A053B-2611-441A-B369-A9D7358AF452",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67CBFE07-3C37-47C5-911C-7BCB42CD732C",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC847DF6-0FB4-498F-9E6A-E9277BEFAF8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24F5C4-CA5A-4627-8E54-4875DF60F950",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2672DF0-E57F-4BD6-A1E7-48923F99E488",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5D35DC-C63F-4D34-993D-03C82D064B1F",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FEF791-A685-4036-8B65-94D00C344AD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13A07CEF-AED7-441D-9E12-5544D61BD91D",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "239A61B6-1F0B-4B80-91E5-372E0F9D9542",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "865585F2-F6FF-46DF-92C8-8AAE46F5BFB3",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4105E5B6-6E70-4E4A-B339-725CF8EB7DF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FA0305-AAD2-4EC0-9E39-991F77D4F088",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3CB421-17F7-4A57-A64C-2C0ACDF54336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D23694DC-EE06-41FB-AB56-DC2C4C7A93CB",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E24C7-5A1F-4CC8-8553-A78DF56DAFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_ls_plus2_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8D6766-50EC-47FF-9F50-4694DD7D041A",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_ls_plus2_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37782E15-4803-4A46-B977-AC8F476EA812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2AB8056-998B-41AA-89C8-044C158D9534",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "195C8A73-78F6-4DEB-A45C-47656691D917",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E515941E-8711-4589-BA51-56E06091269B",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80B9786F-00BF-4212-93A3-D26919F78A7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9882F123-DD49-440F-93F0-57EC1F77F8E4",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7D04BB-CFBC-4987-AB91-D6C84D69EBB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC7A51E-343B-4493-A404-4786FF2902C2",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2D40A-0141-45BF-9058-D9EC91826118",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A216376D-CF93-4C72-ABA6-A2A9A43717FA",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11684682-AC1F-4270-AEA0-9D1324FE3B9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:ipcom_ve2_sc_plus_220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B29069DF-F116-45C5-8EC8-A03AAE9D7135",
"versionEndExcluding": "e20l33_nf1101",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:ipcom_ve2_sc_plus_220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "632309EF-EB1A-4349-9A47-633F6FEA6868",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
},
{
"lang": "es",
"value": "La consola web de la serie IPCOM de FUJITSU Network (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), e IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) permite a un atacante remoto ejecutar un comando arbitrario del sistema operativo por medio de vectores no especificados"
}
],
"id": "CVE-2022-29516",
"lastModified": "2024-11-21T06:59:14.480",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-18T15:15:10.123",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-39921 (GCVE-0-2024-39921)
Vulnerability from cvelistv5 – Published: 2024-09-04 01:51 – Updated: 2025-03-13 13:26
VLAI?
Summary
Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.
Severity ?
7.5 (High)
CWE
- Observable timing discrepancy
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Fsas Technologies Inc. | IPCOM EX2 Series |
Affected:
V01L02NF0001 to V01L06NF0401
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39921",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-04T14:16:53.423725Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-203",
"description": "CWE-203 Observable Discrepancy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:26:40.037Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L02NF0001 to V01L06NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L20NF0001 to V01L20NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V02L20NF0001 to V02L21NF0301"
}
]
},
{
"product": "IPCOM VE2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L04NF0001 to V01L06NF0112"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Observable timing discrepancy",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-04T01:51:14.241Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/"
},
{
"url": "https://jvn.jp/en/jp/JVN29238389/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-39921",
"datePublished": "2024-09-04T01:51:14.241Z",
"dateReserved": "2024-07-03T05:21:05.058Z",
"dateUpdated": "2025-03-13T13:26:40.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-29516 (GCVE-0-2022-29516)
Vulnerability from cvelistv5 – Published: 2022-05-18 09:50 – Updated: 2024-08-03 06:26
VLAI?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FUJITSU LIMITED | IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series |
Affected:
IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"vendor": "FUJITSU LIMITED",
"versions": [
{
"status": "affected",
"version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-18T09:50:24",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-29516",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"version": {
"version_data": [
{
"version_value": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
}
]
},
"vendor_name": "FUJITSU LIMITED"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/",
"refsource": "MISC",
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN96561229/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-29516",
"datePublished": "2022-05-18T09:50:24",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:26:06.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39921 (GCVE-0-2024-39921)
Vulnerability from nvd – Published: 2024-09-04 01:51 – Updated: 2025-03-13 13:26
VLAI?
Summary
Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.
Severity ?
7.5 (High)
CWE
- Observable timing discrepancy
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Fsas Technologies Inc. | IPCOM EX2 Series |
Affected:
V01L02NF0001 to V01L06NF0401
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39921",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-04T14:16:53.423725Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-203",
"description": "CWE-203 Observable Discrepancy",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:26:40.037Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L02NF0001 to V01L06NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L20NF0001 to V01L20NF0401"
}
]
},
{
"product": "IPCOM EX2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V02L20NF0001 to V02L21NF0301"
}
]
},
{
"product": "IPCOM VE2 Series",
"vendor": "Fsas Technologies Inc.",
"versions": [
{
"status": "affected",
"version": "V01L04NF0001 to V01L06NF0112"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Observable timing discrepancy",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-04T01:51:14.241Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.fujitsu.com/jp/products/network/support/2024/ipcom-04/"
},
{
"url": "https://jvn.jp/en/jp/JVN29238389/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-39921",
"datePublished": "2024-09-04T01:51:14.241Z",
"dateReserved": "2024-07-03T05:21:05.058Z",
"dateUpdated": "2025-03-13T13:26:40.037Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-29516 (GCVE-0-2022-29516)
Vulnerability from nvd – Published: 2022-05-18 09:50 – Updated: 2024-08-03 06:26
VLAI?
Summary
The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FUJITSU LIMITED | IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series |
Affected:
IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"vendor": "FUJITSU LIMITED",
"versions": [
{
"status": "affected",
"version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-18T09:50:24",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-29516",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
"version": {
"version_data": [
{
"version_value": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
}
]
}
}
]
},
"vendor_name": "FUJITSU LIMITED"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/",
"refsource": "MISC",
"url": "https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/"
},
{
"name": "https://jvn.jp/en/jp/JVN96561229/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN96561229/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-29516",
"datePublished": "2022-05-18T09:50:24",
"dateReserved": "2022-04-28T00:00:00",
"dateUpdated": "2024-08-03T06:26:06.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}