Vulnerability Details : CVE-2022-30280
/SecurityManagement/html/createuser.jsf in Nokia NetAct 22 allows CSRF. A remote attacker is able to create users with arbitrary privileges, even administrative privileges. The application (even if it implements a CSRF token for the random GET request) does not ever verify a CSRF token. With a little help of social engineering/phishing (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2022-30280
- cpe:2.3:a:nokia:netact:22.0.0.62:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30280
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30280
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-30280
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-30280
-
https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
Vulnerability Research & Advisor | Gruppo TIMNot Applicable
-
https://www.gruppotim.it/it/footer/red-team.html
Gruppo TIM | Vulnerability Research & AdvisorExploit;Third Party Advisory
Jump to