ID

VAR-202110-2123


CVE

CVE-2022-21228


TITLE

(0Day) Fuji Electric Alpha5 Servo Operator C5P File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 1.4

sources: ZDI: ZDI-22-389 // ZDI: ZDI-21-1209

DESCRIPTION

The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. Alpha5 Smart Loader An out-of-bounds write vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of C5P files in the Server Operator module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer

Trust: 2.97

sources: NVD: CVE-2022-21228 // JVNDB: JVNDB-2022-001567 // ZDI: ZDI-22-389 // ZDI: ZDI-21-1209 // VULMON: CVE-2022-21228

AFFECTED PRODUCTS

vendor:fuji electricmodel:alpha5scope: - version: -

Trust: 1.4

vendor:fujielectricmodel:alpha5 smart loaderscope:ltversion:4.3

Trust: 1.0

vendor:富士電機model:alpha5 smart loaderscope: - version: -

Trust: 0.8

vendor:富士電機model:alpha5 smart loaderscope:eqversion:alpha5 smart loader firmware

Trust: 0.8

vendor:富士電機model:alpha5 smart loaderscope:eqversion: -

Trust: 0.8

sources: ZDI: ZDI-22-389 // ZDI: ZDI-21-1209 // JVNDB: JVNDB-2022-001567 // NVD: CVE-2022-21228

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2022-21228
value: HIGH

Trust: 1.4

nvd@nist.gov: CVE-2022-21228
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-21228
value: HIGH

Trust: 1.0

NVD: CVE-2022-21228
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202203-2663
value: HIGH

Trust: 0.6

VULMON: CVE-2022-21228
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-21228
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2022-21228
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2022-21228
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

ZDI: CVE-2022-21228
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.4

NVD: CVE-2022-21228
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZDI: ZDI-22-389 // ZDI: ZDI-21-1209 // VULMON: CVE-2022-21228 // JVNDB: JVNDB-2022-001567 // CNNVD: CNNVD-202203-2663 // NVD: CVE-2022-21228 // NVD: CVE-2022-21228

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-001567 // NVD: CVE-2022-21228

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202203-2663

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202203-2663

PATCH

title:top pageurl:https://www.fujielectric.co.jp/

Trust: 0.8

title:Fuji Electric Alpha5 Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=190334

Trust: 0.6

sources: JVNDB: JVNDB-2022-001567 // CNNVD: CNNVD-202203-2663

EXTERNAL IDS

db:NVDid:CVE-2022-21228

Trust: 4.7

db:ICS CERTid:ICSA-22-090-03

Trust: 2.5

db:JVNid:JVNVU94149543

Trust: 0.8

db:JVNDBid:JVNDB-2022-001567

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-13990

Trust: 0.7

db:ZDIid:ZDI-22-389

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-13941

Trust: 0.7

db:ZDIid:ZDI-21-1209

Trust: 0.7

db:CNNVDid:CNNVD-202203-2663

Trust: 0.6

db:VULMONid:CVE-2022-21228

Trust: 0.1

sources: ZDI: ZDI-22-389 // ZDI: ZDI-21-1209 // VULMON: CVE-2022-21228 // JVNDB: JVNDB-2022-001567 // CNNVD: CNNVD-202203-2663 // NVD: CVE-2022-21228

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-03

Trust: 2.6

url:http://jvn.jp/vu/jvnvu94149543/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-21228

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-21228/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-090-03

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-21228 // JVNDB: JVNDB-2022-001567 // CNNVD: CNNVD-202203-2663 // NVD: CVE-2022-21228

CREDITS

xina1i

Trust: 1.4

sources: ZDI: ZDI-22-389 // ZDI: ZDI-21-1209

SOURCES

db:ZDIid:ZDI-22-389
db:ZDIid:ZDI-21-1209
db:VULMONid:CVE-2022-21228
db:JVNDBid:JVNDB-2022-001567
db:CNNVDid:CNNVD-202203-2663
db:NVDid:CVE-2022-21228

LAST UPDATE DATE

2024-11-23T22:10:53.679000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-389date:2022-03-23T00:00:00
db:ZDIid:ZDI-21-1209date:2022-03-23T00:00:00
db:VULMONid:CVE-2022-21228date:2022-04-21T00:00:00
db:JVNDBid:JVNDB-2022-001567date:2022-04-21T06:03:00
db:CNNVDid:CNNVD-202203-2663date:2022-04-22T00:00:00
db:NVDid:CVE-2022-21228date:2024-11-21T06:44:09.170

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-389date:2022-02-22T00:00:00
db:ZDIid:ZDI-21-1209date:2021-10-15T00:00:00
db:VULMONid:CVE-2022-21228date:2022-04-12T00:00:00
db:JVNDBid:JVNDB-2022-001567date:2022-04-21T00:00:00
db:CNNVDid:CNNVD-202203-2663date:2022-03-31T00:00:00
db:NVDid:CVE-2022-21228date:2022-04-12T17:15:09.227