Lucene search

K
cve[email protected]CVE-2022-2006
HistoryAug 31, 2022 - 4:15 p.m.

CVE-2022-2006

2022-08-3116:15:10
CWE-427
web.nvd.nist.gov
23
4
automationdirect
directlogic
dll
vulnerability
code execution
installation
nvd
cve-2022-2006

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.0%

AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;

Affected configurations

NVD
Node
automationdirectc-more_ea9-t6clMatch-
AND
automationdirectc-more_ea9-t6cl_firmwareRange<6.73
Node
automationdirectc-more_ea9-t6cl-rMatch-
AND
automationdirectc-more_ea9-t6cl-r_firmwareRange<6.73
Node
automationdirectc-more_ea9-t7clMatch-
AND
automationdirectc-more_ea9-t7cl_firmwareRange<6.73
Node
automationdirectc-more_ea9-t7cl-rMatch-
AND
automationdirectc-more_ea9-t7cl-r_firmwareRange<6.73
Node
automationdirectc-more_ea9-t8clMatch-
AND
automationdirectc-more_ea9-t8cl_firmwareRange<6.73
Node
automationdirectc-more_ea9-t10cl_firmwareRange<6.73
AND
automationdirectc-more_ea9-t10clMatch-
Node
automationdirectc-more_ea9-t10wcl_firmwareRange<6.73
AND
automationdirectc-more_ea9-t10wclMatch-
Node
automationdirectc-more_ea9-t12cl_firmwareRange<6.73
AND
automationdirectc-more_ea9-t12clMatch-
Node
automationdirectc-more_ea9-t15cl_firmwareRange<6.73
AND
automationdirectc-more_ea9-t15clMatch-
Node
automationdirectc-more_ea9-t15cl-r_firmwareRange<6.73
AND
automationdirectc-more_ea9-t15cl-rMatch-
Node
automationdirectc-more_ea9-rhmi_firmwareRange<6.73
AND
automationdirectc-more_ea9-rhmiMatch-
Node
automationdirectc-more_ea9-pgmsw_firmwareRange<6.73
AND
automationdirectc-more_ea9-pgmswMatch-

CNA Affected

[
  {
    "product": "C-more EA9",
    "vendor": "AutomationDirect",
    "versions": [
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T6CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T6CL-R",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T7CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T7CL-R",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T8CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T10CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T10WCL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T12CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T15CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-RHMI",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-PGMSW",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.0%

Related for CVE-2022-2006