CVE-2022-3738
CVSS V2 None
CVSS V3 None
Description
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
Overview
- CVE ID
- CVE-2022-3738
- Assigner
- info@cert.vde.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-19T12:15:11
- Last Modified Date
- 2023-01-27T17:18:20
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:cc100_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:cc100:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:* | 1 | OR | 16 | 22 |
cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-054/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-3738 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3738 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-19 13:14:23 | Added to TrackCVE | |||
2023-01-19 13:14:24 | Weakness Enumeration | new | ||
2023-01-19 16:15:26 | 2023-01-19T14:38:20 | CVE Modified Date | updated | |
2023-01-19 16:15:26 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-25 20:13:51 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-27 18:14:23 | 2023-01-27T17:18:20 | CVE Modified Date | updated | |
2023-01-27 18:14:23 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-27 18:14:24 | CPE Information | updated |