Lucene search

K
nvd[email protected]NVD:CVE-2022-28372
HistoryJul 14, 2022 - 1:15 p.m.

CVE-2022-28372

2022-07-1413:15:08
CWE-434
web.nvd.nist.gov
2
verizon 5g home
lvskihp indoorunit
outdoorunit
unvalidated url
firmware update
arbitrary file upload

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

37.9%

On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints provide a means of provisioning a firmware update for the device via crtc_fw_upgrade or crtcfwimage. The URL provided is not validated, and thus allows for arbitrary file upload to the device. This occurs in /lib/lua/luci/crtc.lua (IDU) and /lib/functions/wnc_jsonsh/wnc_crtc_fw.sh (ODU).

Affected configurations

Nvd
Node
verizonlvskihp_indoorunit_firmwareMatch3.4.66.162
AND
verizonlvskihp_indoorunitMatch-
Node
verizonlvskihp_outdoorunit_firmwareMatch3.33.101.0
AND
verizonlvskihp_outdoorunitMatch-
VendorProductVersionCPE
verizonlvskihp_indoorunit_firmware3.4.66.162cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*
verizonlvskihp_indoorunit-cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*
verizonlvskihp_outdoorunit_firmware3.33.101.0cpe:2.3:o:verizon:lvskihp_outdoorunit_firmware:3.33.101.0:*:*:*:*:*:*:*
verizonlvskihp_outdoorunit-cpe:2.3:h:verizon:lvskihp_outdoorunit:-:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

37.9%

Related for NVD:CVE-2022-28372