Lucene search

K
cveIcscertCVE-2022-3086
HistoryDec 02, 2022 - 8:15 p.m.

CVE-2022-3086

2022-12-0220:15:13
CWE-77
icscert
web.nvd.nist.gov
41
cradlepoint
ibr600
ncos
vulnerability
shell escape
local attackers
arbitrary code
cve-2022-3086

CVSS3

7.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

26.5%

Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable
to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.

Affected configurations

Nvd
Node
moxauc-8580-t-lx_firmwareMatch1.1
AND
moxauc-8580-t-lxMatch-
Node
moxauc-8580-t-ct-lx_firmwareMatch1.1
AND
moxauc-8580-t-ct-lxMatch-
Node
moxauc-8580-t-q-lx_firmwareMatch1.1
AND
moxauc-8580-t-q-lxMatch-
Node
moxauc-8580-t-ct-q-lx_firmwareMatch1.1
AND
moxauc-8580-t-ct-q-lxMatch-
Node
moxauc-8580-q-lx_firmwareMatch1.1
AND
moxauc-8580-q-lxMatch-
Node
moxauc-8580-lx_firmwareMatch1.1
AND
moxauc-8580-lxMatch-
Node
moxauc-8540-lx_firmwareRange1.01.2
AND
moxauc-8540-lxMatch-
Node
moxauc-8540-t-ct-lx_firmwareRange1.01.2
AND
moxauc-8540-t-ct-lxMatch-
Node
moxauc-8540-t-lx_firmwareRange1.01.2
AND
moxauc-8540-t-lxMatch-
Node
moxauc-8410a-lx_firmwareMatch2.2
AND
moxauc-8410a-lxMatch-
Node
moxauc-8410a-nw-lx_firmwareMatch2.2
AND
moxauc-8410a-nw-lxMatch-
Node
moxauc-8410a-nw-t-lx_firmwareMatch2.2
AND
moxauc-8410a-nw-t-lxMatch-
Node
moxauc-8410a-t-lx_firmwareMatch2.2
AND
moxauc-8410a-t-lxMatch-
Node
moxauc-8210-t-lx-s_firmwareRange1.02.4
AND
moxauc-8210-t-lx-sMatch-
Node
moxauc-8220-t-lx_firmwareRange1.02.4
AND
moxauc-8220-t-lxMatch-
Node
moxauc-8220-t-lx-us-s_firmwareRange1.02.4
AND
moxauc-8220-t-lx-us-sMatch-
Node
moxauc-8220-t-lx-eu-s_firmwareRange1.02.4
AND
moxauc-8220-t-lx-eu-sMatch-
Node
moxauc-8220-t-lx-ap-s_firmwareRange1.02.4
AND
moxauc-8220-t-lx-ap-sMatch-
Node
moxauc-8112a-me-t-lx_firmwareMatch1.0
OR
moxauc-8112a-me-t-lx_firmwareMatch1.1
AND
moxauc-8112a-me-t-lxMatch-
Node
moxauc-8131-lx_firmwareMatch1.2
OR
moxauc-8131-lx_firmwareMatch1.3
AND
moxauc-8131-lxMatch-
Node
moxauc-8132-lx_firmwareMatch1.2
OR
moxauc-8132-lx_firmwareMatch1.3
AND
moxauc-8132-lxMatch-
Node
moxauc-8162-lx_firmwareMatch1.2
OR
moxauc-8162-lx_firmwareMatch1.3
AND
moxauc-8162-lxMatch-
Node
moxauc-8112-lx_firmwareMatch1.2
OR
moxauc-8112-lx_firmwareMatch1.3
AND
moxauc-8112-lxMatch-
Node
moxauc-5101-lx_firmwareMatch1.2
AND
moxauc-5101-lxMatch-
Node
moxauc-5101-t-lx_firmwareMatch1.2
AND
moxauc-5101-t-lxMatch-
Node
moxauc-5102-lx_firmwareMatch1.2
AND
moxauc-5102-lxMatch-
Node
moxauc-5102-t-lx_firmwareMatch1.2
AND
moxauc-5102-t-lxMatch-
Node
moxauc-5111-lx_firmwareMatch1.2
AND
moxauc-5111-lxMatch-
Node
moxauc-5111-t-lx_firmwareMatch1.2
AND
moxauc-5111-t-lxMatch-
Node
moxauc-5112-lx_firmwareMatch1.2
AND
moxauc-5112-lxMatch-
Node
moxauc-5112-t-lx_firmwareMatch1.2
AND
moxauc-5112-t-lxMatch-
Node
moxauc-3101-t-ap-lx_firmwareRange1.22.0
AND
moxauc-3101-t-ap-lxMatch-
Node
moxauc-3101-t-eu-lx_firmwareRange1.22.0
AND
moxauc-3101-t-eu-lxMatch-
Node
moxauc-3101-t-us-lx_firmwareRange1.22.0
AND
moxauc-3101-t-us-lxMatch-
Node
moxauc-3111-t-ap-lx_firmwareRange1.22.0
AND
moxauc-3111-t-ap-lxMatch-
Node
moxauc-3111-t-ap-lx-nw_firmwareRange1.22.0
AND
moxauc-3111-t-ap-lx-nwMatch-
Node
moxauc-3111-t-eu-lx_firmwareRange1.22.0
AND
moxauc-3111-t-eu-lxMatch-
Node
moxauc-3111-t-eu-lx-nw_firmwareRange1.22.0
AND
moxauc-3111-t-eu-lx-nwMatch-
Node
moxauc-3111-t-us-lx_firmwareRange1.22.0
AND
moxauc-3111-t-us-lxMatch-
Node
moxauc-3111-t-us-lx-nw_firmwareRange1.22.0
AND
moxauc-3111-t-us-lx-nwMatch-
Node
moxauc-3121-t-ap-lx_firmwareRange1.22.0
AND
moxauc-3121-t-ap-lxMatch-
Node
moxauc-3121-t-eu-lx_firmwareRange1.22.0
AND
moxauc-3121-t-eu-lxMatch-
Node
moxauc-3121-t-us-lx_firmwareRange1.22.0
AND
moxauc-3121-t-us-lxMatch-
Node
moxauc-2101-lx_firmwareRange1.31.5
AND
moxauc-2101-lxMatch-
Node
moxauc-2102-lx_firmwareRange1.31.5
AND
moxauc-2102-lxMatch-
Node
moxauc-2104-lx_firmwareRange1.31.5
AND
moxauc-2104-lxMatch-
Node
moxauc-2111-lx_firmwareRange1.31.5
AND
moxauc-2111-lxMatch-
Node
moxauc-2112-lx_firmwareRange1.31.5
AND
moxauc-2112-lxMatch-
Node
moxauc-2114-t-lx_firmwareRange1.31.5
AND
moxauc-2114-t-lxMatch-
Node
moxauc-2114-t-lx_firmwareRange1.31.5
AND
moxauc-2114-t-lxMatch-
Node
moxauc-2116-t-lx_firmwareRange1.31.5
AND
moxauc-2116-t-lxMatch-
VendorProductVersionCPE
moxauc-8580-t-lx_firmware1.1cpe:2.3:o:moxa:uc-8580-t-lx_firmware:1.1:*:*:*:*:*:*:*
moxauc-8580-t-lx-cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*
moxauc-8580-t-ct-lx_firmware1.1cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:1.1:*:*:*:*:*:*:*
moxauc-8580-t-ct-lx-cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*
moxauc-8580-t-q-lx_firmware1.1cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:1.1:*:*:*:*:*:*:*
moxauc-8580-t-q-lx-cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*
moxauc-8580-t-ct-q-lx_firmware1.1cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:1.1:*:*:*:*:*:*:*
moxauc-8580-t-ct-q-lx-cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*
moxauc-8580-q-lx_firmware1.1cpe:2.3:o:moxa:uc-8580-q-lx_firmware:1.1:*:*:*:*:*:*:*
moxauc-8580-q-lx-cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 1051

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "NetCloud OS (NCOS)"
    ],
    "product": "IBR600 ",
    "vendor": "Cradlepoint",
    "versions": [
      {
        "lessThanOrEqual": "6.5.0.160bc2e",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

26.5%

Related for CVE-2022-3086