CVE-2022-38453 (GCVE-0-2022-38453)

Vulnerability from cvelistv5 – Published: 2022-09-13 14:55 – Updated: 2025-04-16 16:09
VLAI?
Summary
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.
CWE
Assigner
References
Credits
Level Nine reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:54:03.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-38453",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T15:49:56.819949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T16:09:53.917Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor",
          "vendor": "Contec Health",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Level Nine reported these vulnerabilities to CISA."
        }
      ],
      "datePublic": "2022-09-01T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-489",
              "description": "CWE-489 Leftover Debug Code",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-13T14:55:03.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"
        }
      ],
      "source": {
        "advisory": "ICSMA-22-244-01",
        "discovery": "EXTERNAL"
      },
      "title": "Contec Health CMS8000",
      "workarounds": [
        {
          "lang": "en",
          "value": "Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2022-09-01T17:00:00.000Z",
          "ID": "CVE-2022-38453",
          "STATE": "PUBLIC",
          "TITLE": "Contec Health CMS8000"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "All",
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Contec Health"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Level Nine reported these vulnerabilities to CISA."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-489 Leftover Debug Code"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01",
              "refsource": "MISC",
              "url": "https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01"
            }
          ]
        },
        "source": {
          "advisory": "ICSMA-22-244-01",
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\n\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\n\nDisabling UART functionality at the CPU level\nEnforcing unique device authentication before granting access to the terminal / bootloader\nWhere possible, enforcing secure boot. \nTamper stickers on the device casing to indicate when a device has been opened"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2022-38453",
    "datePublished": "2022-09-13T14:55:03.842Z",
    "dateReserved": "2022-08-29T00:00:00.000Z",
    "dateUpdated": "2025-04-16T16:09:53.917Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:contechealth:cms8000_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C197D62-6F35-4B87-A721-BDB696EA240F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:contechealth:cms8000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0CD9FA-68D7-4EEE-93A5-97275D84E2D3\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples archivos de aplicaciones binarias en el dispositivo CMS8000 se compilan con las configuraciones de compilaci\\u00f3n \\\"not stripped\\\" y \\\"debug_info\\\". Estas configuraciones de compilaci\\u00f3n disminuyen en gran medida el nivel de esfuerzo para que un actor de la amenaza realice ingenier\\u00eda inversa del c\\u00f3digo confidencial e identifique vulnerabilidades adicionales\"}]",
      "id": "CVE-2022-38453",
      "lastModified": "2024-11-21T07:16:30.503",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 3.0, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.5, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 2.5}]}",
      "published": "2022-09-13T15:15:08.907",
      "references": "[{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-489\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-38453\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2022-09-13T15:15:08.907\",\"lastModified\":\"2024-11-21T07:16:30.503\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples archivos de aplicaciones binarias en el dispositivo CMS8000 se compilan con las configuraciones de compilaci\u00f3n \\\"not stripped\\\" y \\\"debug_info\\\". Estas configuraciones de compilaci\u00f3n disminuyen en gran medida el nivel de esfuerzo para que un actor de la amenaza realice ingenier\u00eda inversa del c\u00f3digo confidencial e identifique vulnerabilidades adicionales\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":3.0,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-489\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:contechealth:cms8000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C197D62-6F35-4B87-A721-BDB696EA240F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:contechealth:cms8000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0CD9FA-68D7-4EEE-93A5-97275D84E2D3\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"product\": \"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor\", \"vendor\": \"Contec Health\", \"versions\": [{\"status\": \"affected\", \"version\": \"All\"}]}], \"credits\": [{\"lang\": \"en\", \"value\": \"Level Nine reported these vulnerabilities to CISA.\"}], \"datePublic\": \"2022-09-01T00:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"NONE\", \"baseScore\": 3, \"baseSeverity\": \"LOW\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-489\", \"description\": \"CWE-489 Leftover Debug Code\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-09-13T14:55:03.000Z\", \"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\"}], \"source\": {\"advisory\": \"ICSMA-22-244-01\", \"discovery\": \"EXTERNAL\"}, \"title\": \"Contec Health CMS8000\", \"workarounds\": [{\"lang\": \"en\", \"value\": \"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\\n\\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\\n\\nDisabling UART functionality at the CPU level\\nEnforcing unique device authentication before granting access to the terminal / bootloader\\nWhere possible, enforcing secure boot. \\nTamper stickers on the device casing to indicate when a device has been opened\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"ics-cert@hq.dhs.gov\", \"DATE_PUBLIC\": \"2022-09-01T17:00:00.000Z\", \"ID\": \"CVE-2022-38453\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Contec Health CMS8000\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"CMS8000 CONTEC ICU CCU Vital Signs Patient Monitor\", \"version\": {\"version_data\": [{\"version_affected\": \"=\", \"version_name\": \"All\", \"version_value\": \"All\"}]}}]}, \"vendor_name\": \"Contec Health\"}]}}, \"credit\": [{\"lang\": \"eng\", \"value\": \"Level Nine reported these vulnerabilities to CISA.\"}], \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple binary application files on the CMS8000 device are compiled with \u0027not stripped\u0027 and \u0027debug_info\u0027 compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.\"}]}, \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"impact\": {\"cvss\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"NONE\", \"baseScore\": 3, \"baseSeverity\": \"LOW\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-489 Leftover Debug Code\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\", \"refsource\": \"MISC\", \"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\"}]}, \"source\": {\"advisory\": \"ICSMA-22-244-01\", \"discovery\": \"EXTERNAL\"}, \"work_around\": [{\"lang\": \"en\", \"value\": \"Contec Health has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Contec Health for additional information.\\n\\nThe following mitigations could assist in reducing the risk for exploitation of vulnerabilities:\\n\\nDisabling UART functionality at the CPU level\\nEnforcing unique device authentication before granting access to the terminal / bootloader\\nWhere possible, enforcing secure boot. \\nTamper stickers on the device casing to indicate when a device has been opened\"}]}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T10:54:03.773Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsma-22-244-01\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-38453\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T15:49:56.819949Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T15:49:59.528Z\"}}]}",
      "cveMetadata": "{\"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"assignerShortName\": \"icscert\", \"cveId\": \"CVE-2022-38453\", \"datePublished\": \"2022-09-13T14:55:03.842Z\", \"dateReserved\": \"2022-08-29T00:00:00.000Z\", \"dateUpdated\": \"2025-04-16T16:09:53.917Z\", \"state\": \"PUBLISHED\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…