Vulnerability Details : CVE-2022-36306
Potential exploit
An authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.
Products affected by CVE-2022-36306
- Airspan » Airvelocity 1500 FirmwareVersions from including (>=) 9.3.0.01249 and up to, including, (<=) 15.18.00.2511cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36306
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36306
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2022-36306
-
The product stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.Assigned by: cve-assign@fb.com (Secondary)
-
The product inappropriately exposes a directory listing with an index of all the resources located inside of the directory.Assigned by: cve-assign@fb.com (Secondary)
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-36306
-
https://helpdesk.airspan.com/browse/TRN3-1691
Permissions Required;Vendor Advisory
-
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9
Exploit;Third Party Advisory
Jump to