Lucene search

K
cvelistIcscertCVELIST:CVE-2022-34150
HistoryJul 19, 2022 - 12:00 a.m.

CVE-2022-34150 ICSA-22-200-01 MiCODUS MV720 GPS tracker Authorization Bypass Through User-Controlled Key

2022-07-1900:00:00
CWE-639
icscert
www.cve.org
2

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification.

CNA Affected

[
  {
    "product": "MV720",
    "vendor": "MiCODUS",
    "versions": [
      {
        "status": "affected",
        "version": "All versions"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

Related for CVELIST:CVE-2022-34150