Lucene search

K
cve[email protected]CVE-2022-29516
HistoryMay 18, 2022 - 3:15 p.m.

CVE-2022-29516

2022-05-1815:15:10
CWE-78
web.nvd.nist.gov
53
7
fujitsu
network
ipcom
web console
remote execution
os command
cve-2022-29516
security vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.8%

The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.

Affected configurations

NVD
Node
fujitsuipcom_ex2_nw_1100_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_nw_1100Match-
Node
fujitsuipcom_ex2_nw_3500_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_nw_3500Match-
Node
fujitsuipcom_ex2_nw_3200_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_nw_3200Match-
Node
fujitsuipcom_ex2_sc_1100_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_sc_1100Match-
Node
fujitsuipcom_ex2_sc_3500_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_sc_3500Match-
Node
fujitsuipcom_ex2_sc_3200_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_sc_3200Match-
Node
fujitsuipcom_ex2_lb_1100_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_lb_1100Match-
Node
fujitsuipcom_ex2_lb_3500_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_lb_3500Match-
Node
fujitsuipcom_ex2_lb_3200_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_lb_3200Match-
Node
fujitsuipcom_ex2_in_1100_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_in_1100Match-
Node
fujitsuipcom_ex2_in_3200_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_in_3200Match-
Node
fujitsuipcom_ex2_in_3500_firmwareRange<v01l05_nf0501
AND
fujitsuipcom_ex2_in_3500Match-
Node
fujitsuipcom_ex2_dc_3500_firmwareRange<v02l21_nf0201
AND
fujitsuipcom_ex2_dc_3500Match-
Node
fujitsuipcom_ex2_dc_3200_firmwareRange<v02l21_nf0201
AND
fujitsuipcom_ex2_dc_3200Match-
Node
fujitsuipcom_ex_in_2300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_in_2300Match-
Node
fujitsuipcom_ex_in_2500_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_in_2500Match-
Node
fujitsuipcom_ex_in_2700_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_in_2700Match-
Node
fujitsuipcom_ex_lb_1100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_lb_1100Match-
Node
fujitsuipcom_ex_lb_1300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_lb_1300Match-
Node
fujitsuipcom_ex_lb_2300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_lb_2300Match-
Node
fujitsuipcom_ex_lb_2500_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_lb_2500Match-
Node
fujitsuipcom_ex_lb_2700_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_lb_2700Match-
Node
fujitsuipcom_ex_sc_1100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_sc_1100Match-
Node
fujitsuipcom_ex_sc_1300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_sc_1300Match-
Node
fujitsuipcom_ex_sc_2300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_sc_2300Match-
Node
fujitsuipcom_ex_sc_2500_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_sc_2500Match-
Node
fujitsuipcom_ex_sc_2700_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_sc_2700Match-
Node
fujitsuipcom_ex_nw_1100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_nw_1100Match-
Node
fujitsuipcom_ex_nw_1300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_nw_1300Match-
Node
fujitsuipcom_ex_nw_2300_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_nw_2300Match-
Node
fujitsuipcom_ex_nw_2500_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_nw_2500Match-
Node
fujitsuipcom_ex_nw_2700_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ex_nw_2700Match-
Node
fujitsuipcom_ve2_ls_100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_100Match-
Node
fujitsuipcom_ve2_ls_200_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_200Match-
Node
fujitsuipcom_ve2_ls_220_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_220Match-
Node
fujitsuipcom_ve2_ls_plus_100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_plus_100Match-
Node
fujitsuipcom_ve2_ls_plus_200_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_plus_200Match-
Node
fujitsuipcom_ve2_ls_plus_220_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_plus_220Match-
Node
fujitsuipcom_ve2_ls_plus2_200_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_plus2_200Match-
Node
fujitsuipcom_ve2_ls_plus2_220_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_ls_plus2_220Match-
Node
fujitsuipcom_ve2_sc_100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_100Match-
Node
fujitsuipcom_ve2_sc_200_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_200Match-
Node
fujitsuipcom_ve2_sc_220_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_220Match-
Node
fujitsuipcom_ve2_sc_plus_100_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_plus_100Match-
Node
fujitsuipcom_ve2_sc_plus_200_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_plus_200Match-
Node
fujitsuipcom_ve2_sc_plus_220_firmwareRange<e20l33_nf1101
AND
fujitsuipcom_ve2_sc_plus_220Match-

CNA Affected

[
  {
    "product": "IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series",
    "vendor": "FUJITSU LIMITED",
    "versions": [
      {
        "status": "affected",
        "version": "IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)"
      }
    ]
  }
]

Social References

More

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.8%

Related for CVE-2022-29516