Lucene search

K
cvelistHitachi EnergyCVELIST:CVE-2022-3927
HistoryJan 05, 2023 - 9:41 p.m.

CVE-2022-3927 The affected products store public and private key that are used to sign and protect custom parameter set files from modification.

2023-01-0521:41:38
CWE-798
Hitachi Energy
www.cve.org
3
hitachienergy
foxman-un
unem
public key
private key
modification
vulnerability

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

60.8%

The affected products store both public and private key that are used to sign and
protect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change
the CPS file, sign it so that it is trusted as the legitimate CPS file.

This issue affects

  • FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C;
  • UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.

List of CPEs:

  • cpe:2.3:a:hitachienergy:foxman-un:R15B:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R15A:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R14B:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R14A:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R11B:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R11A:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R10C:::::::*

  • cpe:2.3:a:hitachienergy:foxman-un:R9C:::::::*

  • cpe:2.3:a:hitachienergy:unem:R15B:::::::*

  • cpe:2.3:a:hitachienergy:unem:R15A:::::::*

  • cpe:2.3:a:hitachienergy:unem:R14B:::::::*

  • cpe:2.3:a:hitachienergy:unem:R14A:::::::*

  • cpe:2.3:a:hitachienergy:unem:R11B:::::::*

  • cpe:2.3:a:hitachienergy:unem:R11A:::::::*

  • cpe:2.3:a:hitachienergy:unem:R10C:::::::*

  • cpe:2.3:a:hitachienergy:unem:R9C:::::::*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "FOXMAN-UN",
    "vendor": "Hitachi Energy",
    "versions": [
      {
        "status": "unaffected",
        "version": "FOXMAN-UN R16A"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R15B"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R15A"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R14B"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R14A"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R11B"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R11A"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R10C"
      },
      {
        "status": "affected",
        "version": "FOXMAN-UN R9C"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "UNEM",
    "vendor": "Hitachi Energy",
    "versions": [
      {
        "status": "unaffected",
        "version": "UNEM R16A"
      },
      {
        "status": "affected",
        "version": "UNEM R15B"
      },
      {
        "status": "affected",
        "version": "UNEM R15A"
      },
      {
        "status": "affected",
        "version": "UNEM R14B"
      },
      {
        "status": "affected",
        "version": "UNEM R14A"
      },
      {
        "status": "affected",
        "version": "UNEM R11B"
      },
      {
        "status": "affected",
        "version": "UNEM R11A"
      },
      {
        "status": "affected",
        "version": "UNEM R10C"
      },
      {
        "status": "affected",
        "version": "UNEM R9C"
      }
    ]
  }
]

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

60.8%

Related for CVELIST:CVE-2022-3927