CVE-2022-46649
Vulnerability from cvelistv5
Published
2023-02-10 00:00
Modified
2024-08-03 14:39
Severity ?
EPSS score ?
Summary
Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.
References
▼ | URL | Tags | |
---|---|---|---|
security@sierrawireless.com | https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-001/ | Vendor Advisory | |
security@sierrawireless.com | https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-04 | Third Party Advisory, US Government Resource | |
security@sierrawireless.com | https://www.otorio.com/blog/airlink-acemanager-vulnerabilities/ | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-001/" }, { "tags": [ "x_transferred" ], "url": "https://www.otorio.com/blog/airlink-acemanager-vulnerabilities/" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ALEOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "all versions before 4.16" } ] } ], "descriptions": [ { "lang": "en", "value": "Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 - Improper Neutralization of Special Elements used in an OS Command", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-10T00:00:00", "orgId": "747bec18-acd0-4d99-a5c8-5e366c66ab7e", "shortName": "SWI" }, "references": [ { "url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-001/" }, { "url": "https://www.otorio.com/blog/airlink-acemanager-vulnerabilities/" }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-04" } ] } }, "cveMetadata": { "assignerOrgId": "747bec18-acd0-4d99-a5c8-5e366c66ab7e", "assignerShortName": "SWI", "cveId": "CVE-2022-46649", "datePublished": "2023-02-10T00:00:00", "dateReserved": "2022-12-05T00:00:00", "dateUpdated": "2024-08-03T14:39:38.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-46649\",\"sourceIdentifier\":\"security@sierrawireless.com\",\"published\":\"2023-02-10T18:15:13.247\",\"lastModified\":\"2023-02-16T18:44:40.943\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"security@sierrawireless.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:es450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"524DF1AE-21F2-4AA6-99E7-6F98304FF845\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:gx450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C12CF71-FE0E-44EA-9F2E-7CFB42E7C216\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.9.7\",\"matchCriteriaId\":\"CA19B9D5-D298-4910-8406-5C5059AB8626\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:lx40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069DD303-C100-4FAF-BD6B-4EE61CBDE9F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:lx60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3B7B3D-1594-434B-8E22-01C67DF54F16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:mp70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"007D4629-4BE2-4C7A-AC8B-E87739E22D12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:rv50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54218BC7-D942-4907-8052-ECB308753162\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:rv50x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D3EF27-E823-4E49-BD58-D050EB02D294\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sierrawireless:rv55:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215BD4AB-8EFD-4F82-ABE4-E7F81AD528C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.16.0\",\"matchCriteriaId\":\"45265DDA-E10F-49D0-B2C6-FC123C42E5AE\"}]}]}],\"references\":[{\"url\":\"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-001/\",\"source\":\"security@sierrawireless.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-04\",\"source\":\"security@sierrawireless.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.otorio.com/blog/airlink-acemanager-vulnerabilities/\",\"source\":\"security@sierrawireless.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.