Search criteria
3 vulnerabilities found for mirupass_pw10_firmware by kingjim
FKIE_CVE-2022-0183
Vulnerability from fkie_nvd - Published: 2022-01-17 10:15 - Updated: 2024-11-21 06:38
Severity ?
Summary
Missing encryption of sensitive data vulnerability in 'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN19826500/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.kingjim.co.jp/download/security/#mirupass | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN19826500/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kingjim.co.jp/download/security/#mirupass | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| kingjim | mirupass_pw10_firmware | - | |
| kingjim | mirupass_pw10 | - | |
| kingjim | mirupass_pw20_firmware | - | |
| kingjim | mirupass_pw20 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:kingjim:mirupass_pw10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FB74D3-B6AA-415E-9864-AEC01357401F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:kingjim:mirupass_pw10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A965B937-4E1D-40F6-947E-816BA0B48EE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:kingjim:mirupass_pw20_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A8DD2F-2606-4AD5-BE79-088B3A50D30A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:kingjim:mirupass_pw20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00914630-3A9A-472D-8FA0-80FB046F7384",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing encryption of sensitive data vulnerability in \u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."
},
{
"lang": "es",
"value": "Una vulnerabilidad de falta de cifrado de datos confidenciales en el firmware de \"MIRUPASS\" PW10 todas las versiones y en el firmware de \"MIRUPASS\" PW20 todas las versiones permite a un atacante que pueda acceder f\u00edsicamente al dispositivo obtener las contrase\u00f1as almacenadas"
}
],
"id": "CVE-2022-0183",
"lastModified": "2024-11-21T06:38:05.520",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-17T10:15:08.200",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-0183 (GCVE-0-2022-0183)
Vulnerability from cvelistv5 – Published: 2022-01-17 09:10 – Updated: 2024-08-02 23:18
VLAI?
Summary
Missing encryption of sensitive data vulnerability in 'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords.
Severity ?
No CVSS data available.
CWE
- Missing encryption of sensitive data
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| KING JIM CO.,LTD. | MIRUPASS |
Affected:
'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:18:42.528Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MIRUPASS",
"vendor": "KING JIM CO.,LTD.",
"versions": [
{
"status": "affected",
"version": "\u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Missing encryption of sensitive data vulnerability in \u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Missing encryption of sensitive data",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-17T09:10:30",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-0183",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MIRUPASS",
"version": {
"version_data": [
{
"version_value": "\u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions"
}
]
}
}
]
},
"vendor_name": "KING JIM CO.,LTD."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Missing encryption of sensitive data vulnerability in \u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing encryption of sensitive data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kingjim.co.jp/download/security/#mirupass",
"refsource": "MISC",
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"name": "https://jvn.jp/en/jp/JVN19826500/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-0183",
"datePublished": "2022-01-17T09:10:31",
"dateReserved": "2022-01-11T00:00:00",
"dateUpdated": "2024-08-02T23:18:42.528Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-0183 (GCVE-0-2022-0183)
Vulnerability from nvd – Published: 2022-01-17 09:10 – Updated: 2024-08-02 23:18
VLAI?
Summary
Missing encryption of sensitive data vulnerability in 'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords.
Severity ?
No CVSS data available.
CWE
- Missing encryption of sensitive data
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| KING JIM CO.,LTD. | MIRUPASS |
Affected:
'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:18:42.528Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MIRUPASS",
"vendor": "KING JIM CO.,LTD.",
"versions": [
{
"status": "affected",
"version": "\u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Missing encryption of sensitive data vulnerability in \u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Missing encryption of sensitive data",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-17T09:10:30",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2022-0183",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MIRUPASS",
"version": {
"version_data": [
{
"version_value": "\u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions"
}
]
}
}
]
},
"vendor_name": "KING JIM CO.,LTD."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Missing encryption of sensitive data vulnerability in \u0027MIRUPASS\u0027 PW10 firmware all versions and \u0027MIRUPASS\u0027 PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing encryption of sensitive data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kingjim.co.jp/download/security/#mirupass",
"refsource": "MISC",
"url": "https://www.kingjim.co.jp/download/security/#mirupass"
},
{
"name": "https://jvn.jp/en/jp/JVN19826500/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN19826500/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-0183",
"datePublished": "2022-01-17T09:10:31",
"dateReserved": "2022-01-11T00:00:00",
"dateUpdated": "2024-08-02T23:18:42.528Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}