ID

VAR-202204-0586


CVE

CVE-2022-1289


TITLE

tildearrow  of  furnace  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-008157

DESCRIPTION

A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce. tildearrow of furnace Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-1289 // JVNDB: JVNDB-2022-008157 // VULMON: CVE-2022-1289

AFFECTED PRODUCTS

vendor:tildearrowmodel:furnacescope:eqversion:0.3

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.5

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.3

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.2

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.2

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.1

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.2.1

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion: -

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.5

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.5.2

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.6

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.5.3

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.2.2

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.4

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.5.4

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.5.1

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.4.7

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:0.3.1

Trust: 1.8

vendor:tildearrowmodel:furnacescope:eqversion:dev65

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:0.6

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev77

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev67

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev75

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev66

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev6

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:0.5.7

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev7

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev10

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev80

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:0.5.5

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev79

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev8

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:0.5.6

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev9

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev68

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev78

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev73

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:0.5.8

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev63

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev69

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev64

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev70

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev72

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev5

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev71

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev76

Trust: 1.0

vendor:tildearrowmodel:furnacescope:eqversion:dev62

Trust: 1.0

vendor:tildearrowmodel:furnacescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-008157 // NVD: CVE-2022-1289

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-1289
value: MEDIUM

Trust: 1.0

cna@vuldb.com: CVE-2022-1289
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-1289
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202204-2733
value: MEDIUM

Trust: 0.6

VULMON: CVE-2022-1289
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-1289
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-1289
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

cna@vuldb.com: CVE-2022-1289
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-1289
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-1289 // JVNDB: JVNDB-2022-008157 // CNNVD: CNNVD-202204-2733 // NVD: CVE-2022-1289 // NVD: CVE-2022-1289

PROBLEMTYPE DATA

problemtype:CWE-404

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-008157 // NVD: CVE-2022-1289

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202204-2733

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202204-2733

PATCH

title:tildearrow Furnace Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189054

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-1289

Trust: 0.1

sources: VULMON: CVE-2022-1289 // CNNVD: CNNVD-202204-2733

EXTERNAL IDS

db:NVDid:CVE-2022-1289

Trust: 3.3

db:VULDBid:196755

Trust: 2.5

db:JVNDBid:JVNDB-2022-008157

Trust: 0.8

db:CNNVDid:CNNVD-202204-2733

Trust: 0.6

db:VULMONid:CVE-2022-1289

Trust: 0.1

sources: VULMON: CVE-2022-1289 // JVNDB: JVNDB-2022-008157 // CNNVD: CNNVD-202204-2733 // NVD: CVE-2022-1289

REFERENCES

url:https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655

Trust: 2.5

url:https://github.com/tildearrow/furnace/commit/0eb02422d5161767e9983bdaa5c429762d3477ce

Trust: 2.5

url:https://vuldb.com/?id.196755

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-1289

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-1289/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2022-1289

Trust: 0.1

sources: VULMON: CVE-2022-1289 // JVNDB: JVNDB-2022-008157 // CNNVD: CNNVD-202204-2733 // NVD: CVE-2022-1289

SOURCES

db:VULMONid:CVE-2022-1289
db:JVNDBid:JVNDB-2022-008157
db:CNNVDid:CNNVD-202204-2733
db:NVDid:CVE-2022-1289

LAST UPDATE DATE

2024-11-23T23:03:53.561000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-1289date:2023-02-02T00:00:00
db:JVNDBid:JVNDB-2022-008157date:2023-07-24T08:23:00
db:CNNVDid:CNNVD-202204-2733date:2022-04-19T00:00:00
db:NVDid:CVE-2022-1289date:2024-11-21T06:40:25.290

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-1289date:2022-04-10T00:00:00
db:JVNDBid:JVNDB-2022-008157date:2023-07-24T00:00:00
db:CNNVDid:CNNVD-202204-2733date:2022-04-10T00:00:00
db:NVDid:CVE-2022-1289date:2022-04-10T16:15:07.847