8.8

CVE-2022-45045

Exploit

Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least 2021, Xiongmai has applied patches to prevent attackers from using this mechanism to execute telnetd.

Data is provided by the National Vulnerability Database (NVD)
XiongmaitechMbd6304t Version-
XiongmaitechNbd6808t-pl Version-
XiongmaitechNbd8008ra-gl Version-
XiongmaitechNbd8016ra-ul Version-
XiongmaitechNbd8032h4-ul Version-
XiongmaitechNbd80s10s-kl Version-
XiongmaitechNbd80s16s-kl Version-
XiongmaitechNbd80x09s-kl Version-
XiongmaitechNbd88x09s-kl Version-
XiongmaitechNbd8904r-yl Version-
XiongmaitechMbd6304t Firmware Version4.02.r11.00000117.10001.131900.00000
   XiongmaitechMbd6304t Version-
XiongmaitechNbd6808t-pl Firmware Version4.02.r11.c7431119.12001.130000.00000
   XiongmaitechNbd6808t-pl Version-
XiongmaitechNbd7004t-p Firmware Version-
   XiongmaitechNbd7004t-p Version-
XiongmaitechNbd7008t-p Firmware Version-
   XiongmaitechNbd7008t-p Version-
XiongmaitechNbd7024h-p Firmware Version-
   XiongmaitechNbd7024h-p Version-
XiongmaitechNbd7024t-p Firmware Version-
   XiongmaitechNbd7024t-p Version-
XiongmaitechNbd7804r-fw Firmware Version-
   XiongmaitechNbd7804r-fw Version-
XiongmaitechNbd7804t-pl Firmware Version-
   XiongmaitechNbd7804t-pl Version-
XiongmaitechNbd7808t-pl Firmware Version-
   XiongmaitechNbd7808t-pl Version-
XiongmaitechNbd7904r-fs Firmware Version-
   XiongmaitechNbd7904r-fs Version-
XiongmaitechNbd7904t-p Firmware Version-
   XiongmaitechNbd7904t-p Version-
XiongmaitechNbd7904t-pl Firmware Version-
   XiongmaitechNbd7904t-pl Version-
XiongmaitechNbd7904t-q Firmware Version-
   XiongmaitechNbd7904t-q Version-
XiongmaitechNbd7908t-q Firmware Version-
   XiongmaitechNbd7908t-q Version-
XiongmaitechNbd8004t-q Firmware Version-
   XiongmaitechNbd8004t-q Version-
XiongmaitechNbd8008r-pl Firmware Version-
   XiongmaitechNbd8008r-pl Version-
XiongmaitechNbd8008t-q Firmware Version-
   XiongmaitechNbd8008t-q Version-
XiongmaitechNbd8016r-ul Firmware Version-
   XiongmaitechNbd8016r-ul Version-
XiongmaitechNbd8025r-ul Firmware Version-
   XiongmaitechNbd8025r-ul Version-
XiongmaitechNbd8032h4-p Firmware Version-
   XiongmaitechNbd8032h4-p Version-
XiongmaitechNbd8032h4-q Firmware Version-
   XiongmaitechNbd8032h4-q Version-
XiongmaitechNbd8032h8-p Firmware Version-
   XiongmaitechNbd8032h8-p Version-
XiongmaitechNbd8064h8-p Firmware Version-
   XiongmaitechNbd8064h8-p Version-
XiongmaitechNbd8904r-pl Firmware Version-
   XiongmaitechNbd8904r-pl Version-
XiongmaitechNbd8904r-yl Firmware Version-
   XiongmaitechNbd8904r-yl Version-
XiongmaitechNbd8904t-q Firmware Version-
   XiongmaitechNbd8904t-q Version-
XiongmaitechNbd8908r-pl Firmware Version-
   XiongmaitechNbd8908r-pl Version-
XiongmaitechNbd8908r-yl Firmware Version-
   XiongmaitechNbd8908r-yl Version-
XiongmaitechNbd8916f4-q Firmware Version-
   XiongmaitechNbd8916f4-q Version-
XiongmaitechNbd8916f8-q Firmware Version-
   XiongmaitechNbd8916f8-q Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.464
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.