Lucene search

K
cvelistCERTVDECVELIST:CVE-2022-3589
HistoryNov 21, 2022 - 9:56 a.m.

CVE-2022-3589 Miele: Vulnerability in cloud service used by appWash

2022-11-2109:56:37
CWE-639
CERTVDE
www.cve.org
miele
cloud service
appwash
vulnerability
authorization bypass
api
attacker
read access
write access
http request

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

An API Endpoint used by Miele’s “AppWash” MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "appWash",
    "vendor": "Miele",
    "versions": [
      {
        "status": "affected",
        "version": "all (until October 5th 2022)"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

Related for CVELIST:CVE-2022-3589