Lucene search

K
cveTalosCVE-2022-26023
HistoryNov 09, 2022 - 6:15 p.m.

CVE-2022-26023

2022-11-0918:15:13
CWE-489
talos
web.nvd.nist.gov
32
2
cve-2022-26023
inhand networks
inrouter302
v3.5.45
vulnerability
security
exploit

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

22.7%

A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.

Affected configurations

Nvd
Vulners
Node
inhandnetworksir302_firmwareMatch3.5.45
AND
inhandnetworksir302Match-
VendorProductVersionCPE
inhandnetworksir302_firmware3.5.45cpe:2.3:o:inhandnetworks:ir302_firmware:3.5.45:*:*:*:*:*:*:*
inhandnetworksir302-cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "InHand Networks",
    "product": "InRouter302",
    "versions": [
      {
        "version": "V3.5.45",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

22.7%

Related for CVE-2022-26023