Vulnerability Details : CVE-2022-43366
IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to access sensitive information via the checkLoginUser, ate, telnet, version, setDebugCfg, and boot interfaces.
Vulnerability category: Information leak
Products affected by CVE-2022-43366
- cpe:2.3:o:ip-com:ew9_firmware:15.11.0.14:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-43366
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-43366
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-43366
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-43366
-
https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/4_information_disclosure.md
IOT_Vulnerability_Discovery/4_information_disclosure.md at main · splashsc/IOT_Vulnerability_Discovery · GitHubExploit;Third Party Advisory
Jump to