Lucene search

K
cve[email protected]CVE-2022-4873
HistoryJan 11, 2023 - 9:15 p.m.

CVE-2022-4873

2023-01-1121:15:10
CWE-787
web.nvd.nist.gov
27
In Wild
cve-2022-4873
netcomm router
buffer overflow
sessionkey
nf20mesh
nf20
nl1902

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%

On Netcomm router models NF20MESH, NF20, and NL1902 a stack based buffer overflow affects the sessionKey parameter. By providing a specific number of bytes, the instruction pointer is able to be overwritten on the stack and crashes the application at a known location.

Affected configurations

NVD
Node
netcommwirelessnf20_firmwareRange<r6b025
AND
netcommwirelessnf20Match-
Node
netcommwirelessnf20mesh_firmwareRange<r6b025
AND
netcommwirelessnf20meshMatch-
Node
netcommwirelessnl1902_firmwareRange<r6b025
AND
netcommwirelessnl1902Match-

CNA Affected

[
  {
    "vendor": "Netcomm",
    "product": "NF20",
    "versions": [
      {
        "status": "affected",
        "version": "R6B025"
      }
    ]
  },
  {
    "vendor": "Netcomm",
    "product": "NF20MESH",
    "versions": [
      {
        "status": "affected",
        "version": "R6B025"
      }
    ]
  },
  {
    "vendor": "Netcomm",
    "product": "NL1902",
    "versions": [
      {
        "status": "affected",
        "version": "R6B025"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%