CVE-2022-4611
CVSS V2 None
CVSS V3 None
Description
A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability.
Overview
- CVE ID
- CVE-2022-4611
- Assigner
- cna@vuldb.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-19T15:15:10
- Last Modified Date
- 2023-01-06T13:58:41
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:* | 1 | OR | 9.5 | |
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9500:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9512:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9519:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9531:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9533:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9535:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5:build_9583:*:*:*:-:*:* | 1 | OR | ||
cpe:2.3:a:clickstudios:passwordstate:9.5.8.4:*:*:*:*:chrome:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.216273 | |
https://vuldb.com/?id.216273 | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4611 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4611 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-19 16:16:52 | Added to TrackCVE | |||
2022-12-19 17:13:45 | 2022-12-19T15:15:10.347 | 2022-12-19T15:15:10 | CVE Published Date | updated |
2022-12-19 17:13:45 | 2022-12-19T16:52:28 | CVE Modified Date | updated | |
2022-12-19 17:13:46 | Received | Awaiting Analysis | Vulnerability Status | updated |
2022-12-21 18:16:52 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2022-12-23 22:15:18 | 2022-12-23T21:24:23 | CVE Modified Date | updated | |
2022-12-23 22:15:18 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-23 22:15:19 | Weakness Enumeration | update | ||
2022-12-23 22:15:20 | CPE Information | updated | ||
2022-12-28 22:15:41 | 2022-12-28T21:15:10 | CVE Modified Date | updated | |
2022-12-28 22:15:41 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-28 22:15:41 | References | updated | ||
2022-12-28 22:15:41 | CVSS V3 information | new | ||
2022-12-29 11:15:16 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2022-12-29 11:15:16 | CVSS V3 information | new | ||
2023-01-06 14:16:51 | 2023-01-06T13:58:41 | CVE Modified Date | updated | |
2023-01-06 14:16:51 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-06 14:16:54 | CVSS V3 information | new |