ID

VAR-202206-1271


CVE

CVE-2022-26057


TITLE

ABB  of  mint workbench  Vulnerability in privilege management in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011900

DESCRIPTION

Vulnerabilities in the Mint WorkBench allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Mint WorkBench installer file allows a low-privileged user to run a "repair" operation on the product. ABB of mint workbench Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-26057 // JVNDB: JVNDB-2022-011900 // VULHUB: VHN-416829 // VULMON: CVE-2022-26057

AFFECTED PRODUCTS

vendor:abbmodel:mint workbenchscope:lteversion:5866

Trust: 1.0

vendor:abbmodel:mint workbenchscope: - version: -

Trust: 0.8

vendor:abbmodel:mint workbenchscope:lteversion:5866 and earlier

Trust: 0.8

vendor:abbmodel:mint workbenchscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011900 // NVD: CVE-2022-26057

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26057
value: HIGH

Trust: 1.0

cybersecurity@ch.abb.com: CVE-2022-26057
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26057
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202206-1529
value: HIGH

Trust: 0.6

VULHUB: VHN-416829
value: HIGH

Trust: 0.1

VULMON: CVE-2022-26057
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-26057
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-416829
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-26057
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cybersecurity@ch.abb.com: CVE-2022-26057
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-26057
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-416829 // VULMON: CVE-2022-26057 // JVNDB: JVNDB-2022-011900 // CNNVD: CNNVD-202206-1529 // NVD: CVE-2022-26057 // NVD: CVE-2022-26057

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:Improper authority management (CWE-269) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-416829 // JVNDB: JVNDB-2022-011900 // NVD: CVE-2022-26057

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202206-1529

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202206-1529

PATCH

title:ABB Mint WorkBench Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201053

Trust: 0.6

sources: CNNVD: CNNVD-202206-1529

EXTERNAL IDS

db:NVDid:CVE-2022-26057

Trust: 3.4

db:ICS CERTid:ICSA-22-202-01

Trust: 1.5

db:JVNid:JVNVU93357079

Trust: 0.8

db:JVNDBid:JVNDB-2022-011900

Trust: 0.8

db:CS-HELPid:SB2022071810

Trust: 0.6

db:AUSCERTid:ESB-2022.3566

Trust: 0.6

db:CNNVDid:CNNVD-202206-1529

Trust: 0.6

db:VULHUBid:VHN-416829

Trust: 0.1

db:VULMONid:CVE-2022-26057

Trust: 0.1

sources: VULHUB: VHN-416829 // VULMON: CVE-2022-26057 // JVNDB: JVNDB-2022-011900 // CNNVD: CNNVD-202206-1529 // NVD: CVE-2022-26057

REFERENCES

url:https://search.abb.com/library/download.aspx?documentid=9akk108467a0305&languagecode=en&documentpartid=&action=launch&_ga=2.38192870.478847987.1655218701-372504397.1647012599

Trust: 2.5

url:https://jvn.jp/vu/jvnvu93357079/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26057

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-01

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26057/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-202-01

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071810

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3566

Trust: 0.6

url:https://search.abb.com/library/download.aspx?documentid=9akk108467a0305&languagecode=en&documentpartid=&action=launch&_ga=2.38192870.478847987.1655218701-372504397.1647012599

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-01

Trust: 0.1

sources: VULHUB: VHN-416829 // VULMON: CVE-2022-26057 // JVNDB: JVNDB-2022-011900 // CNNVD: CNNVD-202206-1529 // NVD: CVE-2022-26057

CREDITS

Michael DePlante (@izobashi) of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202206-1529

SOURCES

db:VULHUBid:VHN-416829
db:VULMONid:CVE-2022-26057
db:JVNDBid:JVNDB-2022-011900
db:CNNVDid:CNNVD-202206-1529
db:NVDid:CVE-2022-26057

LAST UPDATE DATE

2024-11-23T22:10:43.424000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416829date:2022-06-24T00:00:00
db:VULMONid:CVE-2022-26057date:2022-06-24T00:00:00
db:JVNDBid:JVNDB-2022-011900date:2023-08-24T08:26:00
db:CNNVDid:CNNVD-202206-1529date:2022-07-22T00:00:00
db:NVDid:CVE-2022-26057date:2024-11-21T06:53:21.717

SOURCES RELEASE DATE

db:VULHUBid:VHN-416829date:2022-06-15T00:00:00
db:VULMONid:CVE-2022-26057date:2022-06-15T00:00:00
db:JVNDBid:JVNDB-2022-011900date:2023-08-24T00:00:00
db:CNNVDid:CNNVD-202206-1529date:2022-06-15T00:00:00
db:NVDid:CVE-2022-26057date:2022-06-15T19:15:10.897