CVE-2022-40977
CVSS V2 None
CVSS V3 High 7.5
Description
A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
Overview
- CVE ID
- CVE-2022-40977
- Assigner
- info@cert.vde.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-24T10:15:11
- Last Modified Date
- 2023-02-01T15:52:46
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:pilz:pasvisu:*:*:*:*:*:*:*:* | 1 | OR | 1.12.0 | |
AND | ||||
cpe:2.3:o:pilz:pmi_v507_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.3.58 | |
cpe:2.3:h:pilz:pmi_v507:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v512_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.3.58 | |
cpe:2.3:h:pilz:pmi_v512:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v704e_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.2.0 | |
cpe:2.3:h:pilz:pmi_v704e:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v707e_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.2.0 | |
cpe:2.3:h:pilz:pmi_v707e:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v807_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.6.102 | |
cpe:2.3:h:pilz:pmi_v807:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v812_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.6.102 | |
cpe:2.3:h:pilz:pmi_v812:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:pilz:pmi_v815_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.6.102 | |
cpe:2.3:h:pilz:pmi_v815:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-033/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-40977 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40977 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-11-24 11:00:29 | Added to TrackCVE | |||
2022-12-07 18:03:06 | 2022-11-24T10:15Z | 2022-11-24T10:15:11 | CVE Published Date | updated |
2022-12-07 18:03:06 | 2022-12-01T14:15:12 | CVE Modified Date | updated | |
2022-12-07 18:03:06 | Undergoing Analysis | Vulnerability Status | updated | |
2022-12-07 18:03:07 | A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). | A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability. | Description | updated |
2022-12-07 18:03:08 | CPE Information | updated | ||
2023-01-12 10:19:31 | 2023-01-12T10:15:10 | CVE Modified Date | updated | |
2023-01-13 07:15:18 | 2023-01-13T06:15:11 | CVE Modified Date | updated | |
2023-02-01 17:14:04 | 2023-02-01T15:52:46 | CVE Modified Date | updated | |
2023-02-01 17:14:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |