Lucene search

K
cve[email protected]CVE-2022-3738
HistoryJan 19, 2023 - 12:15 p.m.

CVE-2022-3738

2023-01-1912:15:11
CWE-306
web.nvd.nist.gov
35
cve
2022
3738
vulnerability
remote attacker
download
backup file
sensitive information
credentials
cryptographic material
nvd

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.2%

The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.

Affected configurations

NVD
Node
wagopfc100_firmwareRange1622
AND
wagopfc100Match-
Node
wagopfc200_firmwareRange1622
AND
wagopfc200Match-
Node
wagotouch_panel_600_advanced_firmwareRange1622
AND
wagotouch_panel_600_advancedMatch-
Node
wagotouch_panel_600_standard_firmwareRange1622
AND
wagotouch_panel_600_standardMatch-
Node
wagotouch_panel_600_marine_firmwareRange1622
AND
wagotouch_panel_600_marineMatch-
Node
wagocc100_firmwareRange1622
AND
wagocc100Match-
Node
wagoedge_controller_firmwareRange1622
AND
wagoedge_controllerMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Series WAGO PFC100",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Series WAGO PFC200",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Series WAGO Touch Panel 600 Advanced Line",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Series WAGO Touch Panel 600 Marine Line",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Series WAGO Touch Panel 600 Standard Line",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WAGO Compact Controller CC100",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WAGO Edge Controller",
    "vendor": "WAGO",
    "versions": [
      {
        "lessThanOrEqual": "FW22",
        "status": "affected",
        "version": "FW16",
        "versionType": "semver"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.2%

Related for CVE-2022-3738