ID

VAR-202202-1183


CVE

CVE-2022-0365


TITLE

Ricon Mobile  Made  Industrial Cellular Router  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-001298

DESCRIPTION

The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user. Ricon Mobile Provided by the company Industrial Cellular Router Is a mobile network router. Powerful 64-bit Processor and integrated real-timeoperating system specially developed by Ricon Mobile. S9922XL iswidely used in many areas such as intelligent transportation, scada,POS, industrial automation, telemetry, finance, environmental protection.The router suffers from an authenticated OS command injectionvulnerability. Also vulnerable to Heartbleed.Tested on: GNU/Linux 2.6.36 (mips)WEB-ROUTER

Trust: 2.34

sources: NVD: CVE-2022-0365 // JVNDB: JVNDB-2022-001298 // CNVD: CNVD-2022-11495 // ZSL: ZSL-2021-5653 // VULMON: CVE-2022-0365

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-11495

AFFECTED PRODUCTS

vendor:riconmobilemodel:s9922lscope:eqversion:16.10.3

Trust: 1.0

vendor:riconmobilemodel:s9922xlscope:eqversion:16.10.3

Trust: 1.0

vendor:ricon mobilemodel:s9922lscope: - version: -

Trust: 0.8

vendor:ricon mobilemodel:s9922xlscope:eqversion:version 16.10.3

Trust: 0.8

vendor:riconmodel:mobile ricon industrial cellular router s9922xlscope:eqversion:16.10.3

Trust: 0.6

vendor:riconmodel:mobile ricon industrial cellular router s9922lscope:eqversion:16.10.3

Trust: 0.6

vendor:ricon mobilemodel:industrial cellular router sscope:eqversion:model: s9922xl and s9922l

Trust: 0.1

vendor:ricon mobilemodel:industrial cellular router sscope:eqversion:firmware: 16.10.3

Trust: 0.1

sources: ZSL: ZSL-2021-5653 // CNVD: CNVD-2022-11495 // JVNDB: JVNDB-2022-001298 // NVD: CVE-2022-0365

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0365
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-0365
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2022-001298
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2022-11495
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202202-093
value: CRITICAL

Trust: 0.6

ZSL: ZSL-2021-5653
value: (4/5)

Trust: 0.1

VULMON: CVE-2022-0365
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-0365
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2022-11495
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-0365
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-0365
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2022-001298
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZSL: ZSL-2021-5653 // CNVD: CNVD-2022-11495 // VULMON: CVE-2022-0365 // JVNDB: JVNDB-2022-001298 // CNNVD: CNNVD-202202-093 // NVD: CVE-2022-0365 // NVD: CVE-2022-0365

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-001298 // NVD: CVE-2022-0365

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202202-093

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202202-093

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2021-5653

PATCH

title:CONTACTurl:https://riconmobile.com/contact

Trust: 0.8

title:Patch for Ricon Mobile Ricon Industrial Cellular Router S9922L and S9922XL OS Command Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/320691

Trust: 0.6

title:Ricon Industrial Cellular Router S9922L Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=180564

Trust: 0.6

sources: CNVD: CNVD-2022-11495 // JVNDB: JVNDB-2022-001298 // CNNVD: CNNVD-202202-093

EXTERNAL IDS

db:ICS CERTid:ICSA-22-032-01

Trust: 3.2

db:NVDid:CVE-2022-0365

Trust: 3.2

db:JVNid:JVNVU93682644

Trust: 0.9

db:JVNDBid:JVNDB-2022-001298

Trust: 0.8

db:CNVDid:CNVD-2022-11495

Trust: 0.6

db:CS-HELPid:SB2022020407

Trust: 0.6

db:CNNVDid:CNNVD-202202-093

Trust: 0.6

db:PACKETSTORMid:163390

Trust: 0.1

db:EXPLOIT-DBid:50096

Trust: 0.1

db:CXSECURITYid:WLB-2021070038

Trust: 0.1

db:ZSLid:ZSL-2021-5653

Trust: 0.1

db:VULMONid:CVE-2022-0365

Trust: 0.1

sources: ZSL: ZSL-2021-5653 // CNVD: CNVD-2022-11495 // VULMON: CVE-2022-0365 // JVNDB: JVNDB-2022-001298 // CNNVD: CNNVD-202202-093 // NVD: CVE-2022-0365

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01

Trust: 3.3

url:https://jvn.jp/vu/jvnvu93682644/

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-0365

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2022020407

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-032-01

Trust: 0.6

url:https://www.exploit-db.com/exploits/50096

Trust: 0.1

url:https://packetstormsecurity.com/files/163390/

Trust: 0.1

url:https://cxsecurity.com/issue/wlb-2021070038

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/204901

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2022-0365

Trust: 0.1

url:https://riconmobile.com/blog/new-firmware-release-notification

Trust: 0.1

url:https://www.isssource.com/hole-in-ricon-mobile-industrial-cellular-router/

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZSL: ZSL-2021-5653 // CNVD: CNVD-2022-11495 // VULMON: CVE-2022-0365 // JVNDB: JVNDB-2022-001298 // CNNVD: CNNVD-202202-093 // NVD: CVE-2022-0365

CREDITS

Gjoko Krstic of Zero Science Lab reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202202-093

SOURCES

db:ZSLid:ZSL-2021-5653
db:CNVDid:CNVD-2022-11495
db:VULMONid:CVE-2022-0365
db:JVNDBid:JVNDB-2022-001298
db:CNNVDid:CNNVD-202202-093
db:NVDid:CVE-2022-0365

LAST UPDATE DATE

2024-11-23T23:10:57.583000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2021-5653date:2022-09-08T00:00:00
db:CNVDid:CNVD-2022-11495date:2022-02-18T00:00:00
db:VULMONid:CVE-2022-0365date:2022-02-09T00:00:00
db:JVNDBid:JVNDB-2022-001298date:2022-02-03T06:22:00
db:CNNVDid:CNNVD-202202-093date:2022-03-10T00:00:00
db:NVDid:CVE-2022-0365date:2024-11-21T06:38:28.067

SOURCES RELEASE DATE

db:ZSLid:ZSL-2021-5653date:2021-07-04T00:00:00
db:CNVDid:CNVD-2022-11495date:2022-02-18T00:00:00
db:VULMONid:CVE-2022-0365date:2022-02-04T00:00:00
db:JVNDBid:JVNDB-2022-001298date:2022-02-03T00:00:00
db:CNNVDid:CNNVD-202202-093date:2022-02-01T00:00:00
db:NVDid:CVE-2022-0365date:2022-02-04T23:15:12.563