Vulnerability Details : CVE-2022-36310
Potential exploit
Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models.
Products affected by CVE-2022-36310
- Airspan » Airvelocity 1500 FirmwareVersions from including (>=) 9.3.0.01249 and up to, including, (<=) 15.18.00.2511cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36310
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36310
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-36310
-
The product calls a function that can never be guaranteed to work safely.Assigned by: cve-assign@fb.com (Secondary)
References for CVE-2022-36310
-
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm
Exploit;Third Party Advisory
-
https://helpdesk.airspan.com/browse/TRN3-1689
Permissions Required;Vendor Advisory
Jump to