Search criteria

3 vulnerabilities found for michlol by rashim

FKIE_CVE-2022-34769

Vulnerability from fkie_nvd - Published: 2022-08-05 16:15 - Updated: 2024-11-21 07:10
Summary
Michlol - rashim web interface Insecure direct object references (IDOR). First of all, the attacker needs to login. After he performs log into the system there are some functionalities that the specific user is not allowed to perform. However all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then the attacker can access sensitive data that he not supposed to access because its belong to another user.
Impacted products
Vendor Product Version
rashim michlol *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rashim:michlol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BAF83F-0EBE-48E0-8043-039B959E1C67",
              "versionEndExcluding": "187.4392",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Michlol - rashim web interface Insecure direct object references (IDOR).\nFirst of all, the attacker needs to login.\nAfter he performs log into the system there are some functionalities that the specific user is not allowed to perform.\nHowever all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then\nthe attacker can access sensitive data that he not supposed to access because its belong to another user."
    },
    {
      "lang": "es",
      "value": "PROSCEND - PROSCEND / ADVICE .Ltd - Router Celular Industrial G/5G (con GPS)4 Inyecci\u00f3n de comandos del SO no autentificados Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GWICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301"
    }
  ],
  "id": "CVE-2022-34769",
  "lastModified": "2024-11-21T07:10:08.980",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "cna@cyber.gov.il",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-05T16:15:14.467",
  "references": [
    {
      "source": "cna@cyber.gov.il",
      "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
    }
  ],
  "sourceIdentifier": "cna@cyber.gov.il",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-34769 (GCVE-0-2022-34769)

Vulnerability from cvelistv5 – Published: 2022-08-05 15:25 – Updated: 2024-09-16 17:08
VLAI?
Summary
Michlol - rashim web interface Insecure direct object references (IDOR). First of all, the attacker needs to login. After he performs log into the system there are some functionalities that the specific user is not allowed to perform. However all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then the attacker can access sensitive data that he not supposed to access because its belong to another user.
CWE
  • interface Insecure direct object references
Assigner
Impacted products
Vendor Product Version
Michlol Michlol - rashim web Affected: 187.4392 , ≤ 187.4393 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-34769",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T20:22:19.649124Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T20:22:24.913Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:22:10.042Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Michlol - rashim web",
          "vendor": "Michlol",
          "versions": [
            {
              "lessThanOrEqual": "187.4393",
              "status": "affected",
              "version": "187.4392",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-08-03T14:40:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Michlol - rashim web interface Insecure direct object references (IDOR).\u003cbr\u003eFirst of all, the attacker needs to login.\u003cbr\u003eAfter he performs log into the system there are some functionalities that the specific user is not allowed to perform.\u003cbr\u003eHowever all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then\u003cbr\u003ethe attacker can access sensitive data that he not supposed to access because its belong to another user."
            }
          ],
          "value": "Michlol - rashim web interface Insecure direct object references (IDOR).\nFirst of all, the attacker needs to login.\nAfter he performs log into the system there are some functionalities that the specific user is not allowed to perform.\nHowever all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then\nthe attacker can access sensitive data that he not supposed to access because its belong to another user."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "interface Insecure direct object references",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-17T09:47:23.351Z",
        "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
        "shortName": "INCD"
      },
      "references": [
        {
          "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version 187.4392\u003cbr\u003e"
            }
          ],
          "value": "Update to version 187.4392"
        }
      ],
      "source": {
        "advisory": "ILVN-2022-0041",
        "defect": [
          "ILVN-2022-0041"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Michlol - rashim web interface Insecure direct object references (IDOR)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
    "assignerShortName": "INCD",
    "cveId": "CVE-2022-34769",
    "datePublished": "2022-08-05T15:25:06.930961Z",
    "dateReserved": "2022-06-29T00:00:00",
    "dateUpdated": "2024-09-16T17:08:43.887Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-34769 (GCVE-0-2022-34769)

Vulnerability from nvd – Published: 2022-08-05 15:25 – Updated: 2024-09-16 17:08
VLAI?
Summary
Michlol - rashim web interface Insecure direct object references (IDOR). First of all, the attacker needs to login. After he performs log into the system there are some functionalities that the specific user is not allowed to perform. However all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then the attacker can access sensitive data that he not supposed to access because its belong to another user.
CWE
  • interface Insecure direct object references
Assigner
Impacted products
Vendor Product Version
Michlol Michlol - rashim web Affected: 187.4392 , ≤ 187.4393 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-34769",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T20:22:19.649124Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T20:22:24.913Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:22:10.042Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Michlol - rashim web",
          "vendor": "Michlol",
          "versions": [
            {
              "lessThanOrEqual": "187.4393",
              "status": "affected",
              "version": "187.4392",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-08-03T14:40:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Michlol - rashim web interface Insecure direct object references (IDOR).\u003cbr\u003eFirst of all, the attacker needs to login.\u003cbr\u003eAfter he performs log into the system there are some functionalities that the specific user is not allowed to perform.\u003cbr\u003eHowever all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then\u003cbr\u003ethe attacker can access sensitive data that he not supposed to access because its belong to another user."
            }
          ],
          "value": "Michlol - rashim web interface Insecure direct object references (IDOR).\nFirst of all, the attacker needs to login.\nAfter he performs log into the system there are some functionalities that the specific user is not allowed to perform.\nHowever all the attacker needs to do in order to achieve his goals is to change the value of the ptMsl parameter and then\nthe attacker can access sensitive data that he not supposed to access because its belong to another user."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "interface Insecure direct object references",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-17T09:47:23.351Z",
        "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
        "shortName": "INCD"
      },
      "references": [
        {
          "url": "https://www.gov.il/en/Departments/faq/cve_advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version 187.4392\u003cbr\u003e"
            }
          ],
          "value": "Update to version 187.4392"
        }
      ],
      "source": {
        "advisory": "ILVN-2022-0041",
        "defect": [
          "ILVN-2022-0041"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Michlol - rashim web interface Insecure direct object references (IDOR)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
    "assignerShortName": "INCD",
    "cveId": "CVE-2022-34769",
    "datePublished": "2022-08-05T15:25:06.930961Z",
    "dateReserved": "2022-06-29T00:00:00",
    "dateUpdated": "2024-09-16T17:08:43.887Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}