Lucene search

K
cve[email protected]CVE-2022-22813
HistoryFeb 09, 2022 - 11:15 p.m.

CVE-2022-22813

2022-02-0923:15:19
CWE-798
web.nvd.nist.gov
54
cve-2022-22813
nvd
cwe-798
hard-coded credentials
courier
tls
cryptographic key
traffic manipulation

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.4%

A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.

Affected configurations

NVD
Node
schneider-electriceasergy_p141_firmwareMatch-
AND
schneider-electriceasergy_p141Match-
Node
schneider-electriceasergy_p142_firmwareMatch-
AND
schneider-electriceasergy_p142Match-
Node
schneider-electriceasergy_p143_firmwareMatch-
AND
schneider-electriceasergy_p143Match-
Node
schneider-electriceasergy_p145_firmwareMatch-
AND
schneider-electriceasergy_p145Match-
Node
schneider-electriceasergy_p241_firmwareMatch-
AND
schneider-electriceasergy_p241Match-
Node
schneider-electriceasergy_p242_firmwareMatch-
AND
schneider-electriceasergy_p242Match-
Node
schneider-electriceasergy_p243_firmwareMatch-
AND
schneider-electriceasergy_p243Match-
Node
schneider-electriceasergy_p342_firmwareMatch-
AND
schneider-electriceasergy_p342Match-
Node
schneider-electriceasergy_p343_firmwareMatch-
AND
schneider-electriceasergy_p343Match-
Node
schneider-electriceasergy_p344_firmwareMatch-
AND
schneider-electriceasergy_p344Match-
Node
schneider-electriceasergy_p345_firmwareMatch-
AND
schneider-electriceasergy_p345Match-
Node
schneider-electriceasergy_p441_firmwareMatch-
AND
schneider-electriceasergy_p441Match-
Node
schneider-electriceasergy_p442_firmwareMatch-
AND
schneider-electriceasergy_p442Match-
Node
schneider-electriceasergy_p443_firmwareMatch-
AND
schneider-electriceasergy_p443Match-
Node
schneider-electriceasergy_p444_firmwareMatch-
AND
schneider-electriceasergy_p444Match-
Node
schneider-electriceasergy_p445_firmwareMatch-
AND
schneider-electriceasergy_p445Match-
Node
schneider-electriceasergy_p446_firmwareMatch-
AND
schneider-electriceasergy_p446Match-
Node
schneider-electriceasergy_p541_firmwareMatch-
AND
schneider-electriceasergy_p541Match-
Node
schneider-electriceasergy_p542_firmwareMatch-
AND
schneider-electriceasergy_p542Match-
Node
schneider-electriceasergy_p543_firmwareMatch-
AND
schneider-electriceasergy_p543Match-
Node
schneider-electriceasergy_p544_firmwareMatch-
AND
schneider-electriceasergy_p544Match-
Node
schneider-electriceasergy_p545_firmwareMatch-
AND
schneider-electriceasergy_p545Match-
Node
schneider-electriceasergy_p546_firmwareMatch-
AND
schneider-electriceasergy_p546Match-
Node
schneider-electriceasergy_p642_firmwareMatch-
AND
schneider-electriceasergy_p642Match-
Node
schneider-electriceasergy_p643_firmwareMatch-
AND
schneider-electriceasergy_p643Match-
Node
schneider-electriceasergy_p645_firmwareMatch-
AND
schneider-electriceasergy_p645Match-
Node
schneider-electriceasergy_p741_firmwareMatch-
AND
schneider-electriceasergy_p741Match-
Node
schneider-electriceasergy_p742_firmwareMatch-
AND
schneider-electriceasergy_p742Match-
Node
schneider-electriceasergy_p743_firmwareMatch-
AND
schneider-electriceasergy_p743Match-
Node
schneider-electriceasergy_p746_firmwareMatch-
AND
schneider-electriceasergy_p746Match-
Node
schneider-electriceasergy_p341_firmwareMatch-
AND
schneider-electriceasergy_p341Match-
Node
schneider-electriceasergy_p841_firmwareMatch-
AND
schneider-electriceasergy_p841Match-
Node
schneider-electriceasergy_p849_firmwareMatch-
AND
schneider-electriceasergy_p849Match-

CNA Affected

[
  {
    "product": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.4%

Related for CVE-2022-22813