CVE-2022-40994
CVSS V2 None
CVSS V3 None
Description
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no firmwall keyword WORD description (WORD|null)' command template.
Overview
- CVE ID
- CVE-2022-40994
- Assigner
- talos-cna@cisco.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-26T22:15:17
- Last Modified Date
- 2023-02-02T17:52:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-40994 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40994 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-26 23:19:02 | Added to TrackCVE | |||
2023-01-26 23:19:03 | Weakness Enumeration | new | ||
2023-01-27 15:15:21 | 2023-01-27T14:03:31 | CVE Modified Date | updated | |
2023-01-27 15:15:21 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-27 15:15:25 | CVSS V3 information | new | ||
2023-02-01 13:14:21 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-02-01 13:14:24 | CVSS V3 information | new | ||
2023-02-02 19:14:25 | 2023-02-02T17:52:45 | CVE Modified Date | updated | |
2023-02-02 19:14:25 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-02 19:14:29 | CPE Information | updated | ||
2023-02-02 19:14:29 | CVSS V3 information | new |