Lucene search

K
cve[email protected]CVE-2022-3589
HistoryNov 21, 2022 - 10:15 a.m.

CVE-2022-3589

2022-11-2110:15:31
CWE-639
web.nvd.nist.gov
35
9
cve-2022-3589
miele
appwash
api
security
vulnerability
authorization bypass

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.5%

An API Endpoint used by Miele’s “AppWash” MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

Affected configurations

NVD
Node
mieleappwash
CPENameOperatorVersion
miele:appwashmiele appwasheq*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "appWash",
    "vendor": "Miele",
    "versions": [
      {
        "status": "affected",
        "version": "all (until October 5th 2022)"
      }
    ]
  }
]

Social References

More

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.5%

Related for CVE-2022-3589