GSD-2022-29964
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-29964",
"description": "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350.",
"id": "GSD-2022-29964"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-29964"
],
"details": "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350.",
"id": "GSD-2022-29964",
"modified": "2023-12-13T01:19:41.721285Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-29964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.forescout.com/blog/",
"refsource": "MISC",
"url": "https://www.forescout.com/blog/"
},
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03",
"refsource": "MISC",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:deltav_distributed_control_system_sq_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0352AC6-4B32-4C94-A006-2B98C6C89882",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:deltav_distributed_control_system_sq_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D565B21C-60BB-404B-BE80-62528DE1F15D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:deltav_distributed_control_system_sx_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C57F3262-3580-4376-BA56-35D31AD05FE4",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:deltav_distributed_control_system_sx_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2249F041-9F01-4DA8-9A58-AF71B927BE04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4002s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C36E50DF-50EF-4585-9C9E-3CE98D7DE8F5",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4002s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF9A47C-1284-4CCA-80B4-E4A07A33D822",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4003s2b4_16-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C279FF-0A37-4D1B-8BA2-E26C2E57D8E6",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4003s2b4_16-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8CEF8B0-8198-42D8-B0DF-E113014CAF99",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4003s2b524-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3544369C-605D-4DB3-A833-51319868C5A9",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4003s2b524-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA97F935-4B3B-404C-9716-00DC1E823B39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4017p0_h1_i\\/o_interface_card_and_terminl_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA113B46-5B27-43E6-AFC1-A664560FDA95",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4017p0_h1_i\\/o_interface_card_and_terminl_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96746FF1-06B3-44B2-8170-F644886E3B56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4017p1_h1_i\\/o_card_with_integrated_power_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D08A2F8D-009E-44B0-B8F6-5FFF1B8269EE",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4017p1_h1_i\\/o_card_with_integrated_power:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F172D4-3624-4718-89B3-3F3B33CEAE60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4019p0_simplex_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E2B7F7-C863-4DC0-8866-A2A5DEA865E0",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4019p0_simplex_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C2E234B-03F1-4C16-AFDA-1C76B3DEFF0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4026_virtual_i\\/o_module_2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C158A562-C979-493D-8DCD-62D8464FE4A3",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4026_virtual_i\\/o_module_2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A51BF73-33F0-44EF-A412-EF0CDF966222",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4027_virtual_i\\/o_module_2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7D7C1F-77DC-4323-ACAA-5D93C43ABE28",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4027_virtual_i\\/o_module_2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B041C40E-5510-43F7-836A-48C3643BDE35",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4032s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71809713-E69E-441B-A61D-08F87A450BF8",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4032s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28CF78B7-6921-42D2-AB02-E53D95245898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4037p0_h1_i\\/o_interface_card_and_terminl_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA77C5B-5521-4913-AE46-046AA709C6CB",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4037p0_h1_i\\/o_interface_card_and_terminl_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7324E231-7244-404A-BBCD-BE04495B4A31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4037p1_redundant_h1_i\\/o_card_with_integrated_power_and_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF360367-3196-4FE3-AB51-284EFA6C8F3A",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4037p1_redundant_h1_i\\/o_card_with_integrated_power_and_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76C372C3-8BD0-4CC9-8753-DB8ED834BAF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4039p0_redundant_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE61CA37-BE15-400D-A9AF-268A2534EAA3",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4039p0_redundant_h1_4-port_plus_fieldbus_i\\/o_interface_with_terminalblock:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25502581-C234-405E-B0A2-803FCCF9CB98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4052s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3369AED2-91CE-4EDD-9F6E-B50AB7326537",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4052s1t2b6_high_side_40-pin_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3553747E-ACB7-4B0B-B72F-E309FB8C14CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4082s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50FEFF3F-BF3F-45A8-A5A5-96210FD97B43",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4082s1t2b8_high_side_40-pin_do_mass_i\\/o_terminal_block:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC1799C-5C6D-41DE-A05F-A0C376F4DF25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4100_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB96C56-2399-4396-A3FD-D1A8146C5F13",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4100_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A509A93B-9822-4029-88D4-1CA26AA26CA2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4101_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19A4EEA1-975A-4AFB-8F65-83FEADB81203",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4101_simplex_ethernet_i\\/o_card_\\(eioc\\)_assembly:-:*:*:*:*:*:*:*",
"matchCriteriaId": "119231C0-A3A7-4745-AA58-E3E0FFDF19AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:se4801t0x_redundant_wireless_i\\/o_card_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3AB79565-6EB6-4D0F-8008-FC0036811702",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:se4801t0x_redundant_wireless_i\\/o_card:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F515BD5-A516-4EF6-83BD-1D4FB13554A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:ve4103_modbus_tcp_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B336486C-85E0-44DF-8D00-D8A44553CA68",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:ve4103_modbus_tcp_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "E124883C-AE12-4293-9755-E6E2D8FA14C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:ve4104_ethernet\\/ip_control_tag_integration_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7251E0-73AC-401E-A32D-B785175CA389",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:ve4104_ethernet\\/ip_control_tag_integration_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "74CAD82E-735A-4035-8B3E-48493F2571E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:ve4105_ethernet\\/ip_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9628C7C-A568-4BBC-A1E0-4346977726E5",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:ve4105_ethernet\\/ip_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "7855329F-F2CB-43B9-9EF9-E09B420E7D9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:ve4106_opc-ua_client_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D89F5E7-BFE6-4755-BF60-A00FAE06C027",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:ve4106_opc-ua_client_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB62397-6E64-4D08-8A0F-00D007938D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:emerson:ve4107_iec_61850_mms_interface_for_ethernet_connected_i\\/o_\\(eioc\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5E6739-53E7-46AB-B02E-212CF0E1AA26",
"versionEndIncluding": "2022-04-29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:emerson:ve4107_iec_61850_mms_interface_for_ethernet_connected_i\\/o_\\(eioc\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A77957-F875-4616-812F-F37A68622922",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350."
},
{
"lang": "es",
"value": "Los controladores del Sistema de Control Distribuido (DCS) de Emerson DeltaV y las tarjetas IO versiones hasta 29-04-2022, hacen un uso inapropiado de las contrase\u00f1as. WIOC SSH proporciona acceso a un shell como root, DeltaV o copia de seguridad por medio de credenciales embebidas. NOTA: esto es diferente de CVE-2014-2350."
}
],
"id": "CVE-2022-29964",
"lastModified": "2024-02-13T15:57:56.543",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-26T22:15:11.140",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-181-03"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.forescout.com/blog/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…