Vulnerability Details : CVE-2022-40282
The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.
Products affected by CVE-2022-40282
- cpe:2.3:o:belden:hirschmann_bat-c2_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-40282
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-40282
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-40282
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-40282
-
https://www.belden.com/support/security-assurance
Security AssuranceBroken Link
-
http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html
Hirschmann (Belden) BAT-C2 8.8.1.0R8 Command Injection ≈ Packet StormExploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2022/Nov/19
Full Disclosure: CyberDanube Security Research 20221124-0 | Authenticated Command Injection Hirschmann BAT-C2Exploit;Third Party Advisory
Jump to