CVE-2022-3927
Vulnerability from cvelistv5
Published
2023-01-05 21:41
Modified
2024-08-03 01:27
Summary
The affected products store public and private key that are used to sign and protect custom parameter set files from modification.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:27:52.952Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "FOXMAN-UN",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "unaffected",
              "version": "FOXMAN-UN R16A"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R15B"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R15A"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R14B"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R14A"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R11B"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R11A"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R10C"
            },
            {
              "status": "affected",
              "version": "FOXMAN-UN R9C"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UNEM",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "unaffected",
              "version": "UNEM R16A"
            },
            {
              "status": "affected",
              "version": "UNEM R15B"
            },
            {
              "status": "affected",
              "version": "UNEM R15A"
            },
            {
              "status": "affected",
              "version": "UNEM R14B"
            },
            {
              "status": "affected",
              "version": "UNEM R14A"
            },
            {
              "status": "affected",
              "version": "UNEM R11B"
            },
            {
              "status": "affected",
              "version": "UNEM R11A"
            },
            {
              "status": "affected",
              "version": "UNEM R10C"
            },
            {
              "status": "affected",
              "version": "UNEM R9C"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "K-Businessom AG, Austria"
        }
      ],
      "datePublic": "2022-12-13T13:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nThe affected products store both public and private key that are used to sign and\nprotect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change\nthe CPS file, sign it so that it is trusted as the legitimate CPS file.\n\n\n\n\n\u003cp\u003e\n\n\u003c/p\u003e\u003cp\u003eThis issue affects \u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eFOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; \u003c/li\u003e\u003cli\u003eUNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003eList of CPEs: \u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: var(--wht);\"\u003ecpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\u003c/span\u003e\u003cbr\u003e\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: var(--wht);\"\u003ecpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\u003c/span\u003e\u003cbr\u003e\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\u003c/li\u003e\u003cli\u003ecpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "\nThe affected products store both public and private key that are used to sign and\nprotect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change\nthe CPS file, sign it so that it is trusted as the legitimate CPS file.\n\n\n\n\n\n\n\n\nThis issue affects \n\n\n\n  *  FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; \n  *  UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\n\n\n\n\nList of CPEs: \n  *  cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\n\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\n\n  *  cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\n\n\n\n\n\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-75",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-75 Manipulating Writeable Configuration Files"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-05T21:41:38.258Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        },
        {
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "The affected products store public and private key that are used to sign and protect custom parameter set files from modification.",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "For immediate recommended mitigation action if using FOXMAN-UN R15B and earlier OR UNEM R15B\u0026nbsp;and earlier, follow the recommended security practices as described in section\u0026nbsp;Mitigation Factors/Workarounds in the respective products\u0027 advisory."
            }
          ],
          "value": "For immediate recommended mitigation action if using FOXMAN-UN R15B and earlier OR UNEM R15B\u00a0and earlier, follow the recommended security practices as described in section\u00a0Mitigation Factors/Workarounds in the respective products\u0027 advisory."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2022-3927",
    "datePublished": "2023-01-05T21:41:38.258Z",
    "dateReserved": "2022-11-10T14:47:26.984Z",
    "dateUpdated": "2024-08-03T01:27:52.952Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-3927\",\"sourceIdentifier\":\"cybersecurity@hitachienergy.com\",\"published\":\"2023-01-05T22:15:09.300\",\"lastModified\":\"2023-11-07T03:51:58.500\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nThe affected products store both public and private key that are used to sign and\\nprotect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change\\nthe CPS file, sign it so that it is trusted as the legitimate CPS file.\\n\\n\\n\\n\\n\\n\\n\\n\\nThis issue affects \\n\\n\\n\\n  *  FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; \\n  *  UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\\n\\n\\n\\n\\nList of CPEs: \\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\\n\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\\n\\n  *  cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\\n  *  cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\\n\\n\\n\\n\\n\\n\\n\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"cybersecurity@hitachienergy.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]},{\"source\":\"cybersecurity@hitachienergy.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachienergy:foxman-un:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r16a\",\"matchCriteriaId\":\"73A42F39-F15F-41AE-BFE9-C4ACED6B715D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachienergy:unem:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r16a\",\"matchCriteriaId\":\"5C32E48B-250D-4811-9130-3499C4DBE04A\"}]}]}],\"references\":[{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"cybersecurity@hitachienergy.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"cybersecurity@hitachienergy.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.