ID

VAR-202208-0866


CVE

CVE-2022-34365


TITLE

Dell's  Dell Wyse Management Suite  Past traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-014400

DESCRIPTION

WMS 3.7 contains a Path Traversal Vulnerability in Device API. An attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application. Dell's Dell Wyse Management Suite Exists in a past traversal vulnerability.Information may be obtained

Trust: 1.71

sources: NVD: CVE-2022-34365 // JVNDB: JVNDB-2022-014400 // VULHUB: VHN-426681

AFFECTED PRODUCTS

vendor:dellmodel:wyse management suitescope:ltversion:3.8.0

Trust: 1.0

vendor:デルmodel:dell wyse management suitescope:eqversion:3.8.0

Trust: 0.8

vendor:デルmodel:dell wyse management suitescope:eqversion: -

Trust: 0.8

vendor:デルmodel:dell wyse management suitescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-014400 // NVD: CVE-2022-34365

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34365
value: MEDIUM

Trust: 1.0

security_alert@emc.com: CVE-2022-34365
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34365
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202208-2723
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-34365
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-34365
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-014400 // CNNVD: CNNVD-202208-2723 // NVD: CVE-2022-34365 // NVD: CVE-2022-34365

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:Path traversal (CWE-22) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-426681 // JVNDB: JVNDB-2022-014400 // NVD: CVE-2022-34365

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202208-2723

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202208-2723

PATCH

title:Dell Wyse Management Suite Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204252

Trust: 0.6

sources: CNNVD: CNNVD-202208-2723

EXTERNAL IDS

db:NVDid:CVE-2022-34365

Trust: 3.3

db:JVNDBid:JVNDB-2022-014400

Trust: 0.8

db:CNNVDid:CNNVD-202208-2723

Trust: 0.6

db:VULHUBid:VHN-426681

Trust: 0.1

sources: VULHUB: VHN-426681 // JVNDB: JVNDB-2022-014400 // CNNVD: CNNVD-202208-2723 // NVD: CVE-2022-34365

REFERENCES

url:https://www.dell.com/support/kbdoc/en-us/000201383/dsa-2022-134-dell-wyse-management-suite-security-update-for-multiple-vulnerabilities

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-34365

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34365/

Trust: 0.6

sources: VULHUB: VHN-426681 // JVNDB: JVNDB-2022-014400 // CNNVD: CNNVD-202208-2723 // NVD: CVE-2022-34365

SOURCES

db:VULHUBid:VHN-426681
db:JVNDBid:JVNDB-2022-014400
db:CNNVDid:CNNVD-202208-2723
db:NVDid:CVE-2022-34365

LAST UPDATE DATE

2024-08-14T13:21:46.120000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426681date:2022-08-13T00:00:00
db:JVNDBid:JVNDB-2022-014400date:2023-09-19T08:08:00
db:CNNVDid:CNNVD-202208-2723date:2022-08-15T00:00:00
db:NVDid:CVE-2022-34365date:2022-08-13T00:14:47.710

SOURCES RELEASE DATE

db:VULHUBid:VHN-426681date:2022-08-10T00:00:00
db:JVNDBid:JVNDB-2022-014400date:2023-09-19T00:00:00
db:CNNVDid:CNNVD-202208-2723date:2022-08-10T00:00:00
db:NVDid:CVE-2022-34365date:2022-08-10T17:15:09.223