5.7
CVE-2022-2338
- EPSS 0.03%
- Veröffentlicht 17.08.2022 21:15:09
- Zuletzt bearbeitet 21.11.2024 07:00:47
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Softing ≫ Edgeaggregator Version3.1
Softing ≫ Edgeconnector Version3.1
Softing ≫ Opc Ua C++ Software Development Kit Version6
Softing ≫ Secure Integration Server Version1.22
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.092 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| ics-cert@hq.dhs.gov | 5.7 | 2.1 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.