Lucene search

K
cvelistIcscertCVELIST:CVE-2022-2005
HistoryAug 31, 2022 - 3:33 p.m.

CVE-2022-2005 AutomationDirect C-more EA9 HMI Cleartext Transmission

2022-08-3115:33:03
CWE-319
icscert
www.cve.org
2
automationdirect
c-more ea9
hmi
cleartext transmission
vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

50.5%

AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;

CNA Affected

[
  {
    "product": "C-more EA9",
    "vendor": "AutomationDirect",
    "versions": [
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T6CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T6CL-R",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T7CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T7CL-R",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T8CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T10CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T10WCL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T12CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-T15CL",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-RHMI",
        "versionType": "custom"
      },
      {
        "lessThan": "6.73",
        "status": "affected",
        "version": "EA9-PGMSW",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

50.5%

Related for CVELIST:CVE-2022-2005