Lucene search

K
nvd[email protected]NVD:CVE-2022-28369
HistoryJul 14, 2022 - 1:15 p.m.

CVE-2022-28369

2022-07-1413:15:08
CWE-434
web.nvd.nist.gov
2
verizon 5g home
idu 3.4.66.162
remote code execution
url input
security vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

77.8%

Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function’s enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.

Affected configurations

Nvd
Node
verizonlvskihp_indoorunit_firmwareMatch3.4.66.162
AND
verizonlvskihp_indoorunitMatch-
VendorProductVersionCPE
verizonlvskihp_indoorunit_firmware3.4.66.162cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*
verizonlvskihp_indoorunit-cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

77.8%

Related for NVD:CVE-2022-28369