CVE-2022-22991
Description
A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.
Related CPE's
References
CvssV3 impact
Version | 3.1 |
VectorString | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
AttackVector | ADJACENT_NETWORK |
AttackComplexity | LOW |
PrivilegesRequired | NONE |
UserInteraction | NONE |
Scope | UNCHANGED |
ConfidentialityImpact | HIGH |
IntegrityImpact | HIGH |
AvailabilityImpact | HIGH |
BaseScore | 8.8 |
BaseSeverity | HIGH |
CvssV2 impact
Version | 2.0 |
VectorString | AV:A/AC:L/Au:N/C:C/I:C/A:C |
AccessVector | ADJACENT_NETWORK |
AccessComplexity | LOW |
Authentication | NONE |
ConfidentialityImpact | COMPLETE |
IntegrityImpact | COMPLETE |
AvailabilityImpact | COMPLETE |
BaseScore | 8.300000190734863 |