Vulnerability Details : CVE-2022-22520
A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2.
Products affected by CVE-2022-22520
- cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
- cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
- cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*
- cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-22520
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-22520
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
CERT VDE | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2022-22520
-
The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.Assigned by: info@cert.vde.com (Primary)
References for CVE-2022-22520
-
https://cert.vde.com/en/advisories/VDE-2022-011
VDE-2022-011 | CERT@VDEThird Party Advisory;VDB Entry
-
https://cert.vde.com/en/advisories/VDE-2022-039
VDE-2022-039 | CERT@VDENot Applicable
Jump to