VAR-202211-1567

Vulnerability from variot - Updated: 2024-05-30 22:55

A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. Hitachi Energy PCM600 is a simplified management tool for protection and control relays from Hitachi, Japan.

Hitachi Energy PCM600 has an information disclosure vulnerability. The vulnerability stems from the fact that IED credentials are stored in the PCM600 database in clear text

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1567",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pcm600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "2.11"
      },
      {
        "model": "650connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "2.3.0"
      },
      {
        "model": "670connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "3.0.2"
      },
      {
        "model": "pwc600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.1.1"
      },
      {
        "model": "sam600ioconnectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.1.0"
      },
      {
        "model": "650connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "2.2.2"
      },
      {
        "model": "670connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "3.2.6"
      },
      {
        "model": "pwc600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.2.0"
      },
      {
        "model": "670connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "3.4.1"
      },
      {
        "model": "pwc600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.3.0"
      },
      {
        "model": "650connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "2.4.1"
      },
      {
        "model": "gms600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.3.1"
      },
      {
        "model": "pwc600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.1.2"
      },
      {
        "model": "670connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "3.1.2"
      },
      {
        "model": "670connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "3.3.0"
      },
      {
        "model": "sam600ioconnectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.0.0"
      },
      {
        "model": "650connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "2.1.2"
      },
      {
        "model": "gms600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.3.0"
      },
      {
        "model": "pwc600connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.1.0"
      },
      {
        "model": "sam600ioconnectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.2.0"
      },
      {
        "model": "650connectivitypackage",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "1.3.0"
      },
      {
        "model": "energy pcm600",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "2.6"
      },
      {
        "model": "energy relion",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "670\u003e=3.0,\u003c=3.4.1"
      },
      {
        "model": "energy relion",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "650\u003e=1.3,\u003c=2.4.1"
      },
      {
        "model": "energy relion sam600 io",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "1.0,\u003c=1.2"
      },
      {
        "model": "energy gms600",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "1.3,\u003c=1.3.1"
      },
      {
        "model": "energy pwc600",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "1.1,\u003c=1.3"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:650connectivitypackage:2.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:650connectivitypackage:1.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:670connectivitypackage:3.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.11",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "cve": "CVE-2022-2513",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2022-86325",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "cybersecurity@hitachienergy.com",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.5,
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2022-2513",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "cybersecurity@hitachienergy.com",
            "id": "CVE-2022-2513",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2022-86325",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202211-3282",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy\u2019s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. Hitachi Energy PCM600 is a simplified management tool for protection and control relays from Hitachi, Japan. \n\r\n\r\nHitachi Energy PCM600 has an information disclosure vulnerability. The vulnerability stems from the fact that IED credentials are stored in the PCM600 database in clear text",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2513"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-2513",
        "trust": 2.3
      },
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2513",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2513"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "id": "VAR-202211-1567",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      }
    ]
  },
  "last_update_date": "2024-05-30T22:55:12.335000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for Hitachi Energy PCM600 Information Disclosure Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/365576"
      },
      {
        "title": "Hitachi Energy PCM600 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=215778"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-312",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.3,
        "url": "https://search.abb.com/library/download.aspx?documentid=8dbd000120\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
      },
      {
        "trust": 1.0,
        "url": "https://publisher.hitachienergy.com/preview?documentid=8dbd000120\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-2513/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2513"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2513"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "date": "2022-11-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-2513"
      },
      {
        "date": "2022-11-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "date": "2022-11-22T11:15:29.027000",
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      },
      {
        "date": "2022-11-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-2513"
      },
      {
        "date": "2022-12-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      },
      {
        "date": "2024-05-28T11:15:10.083000",
        "db": "NVD",
        "id": "CVE-2022-2513"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi Energy PCM600 Information Disclosure Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2022-86325"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202211-3282"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…