ID

VAR-202209-1911


CVE

CVE-2022-34394


TITLE

Dell's  smartfabric os10  Certificate validation vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2022-018119

DESCRIPTION

Dell OS10, version 10.5.3.4, contains an Improper Certificate Validation vulnerability in Support Assist. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to limited switch configuration data. The vulnerability could be leveraged by attackers to conduct man-in-the-middle attacks to gain access to the Support Assist information. Dell's smartfabric os10 Exists in a certificate validation vulnerability.Information may be obtained. Dell SmartFabric OS10 is a Linux-based network switch operating system developed by Dell. Dell SmartFabric OS10 versions prior to 1010.5.1.11 have a security vulnerability

Trust: 1.71

sources: NVD: CVE-2022-34394 // JVNDB: JVNDB-2022-018119 // VULHUB: VHN-426710

AFFECTED PRODUCTS

vendor:dellmodel:smartfabric os10scope:eqversion:10.5.3.4

Trust: 1.0

vendor:デルmodel:smartfabric os10scope:eqversion:10.5.3.4

Trust: 0.8

vendor:デルmodel:smartfabric os10scope:eqversion: -

Trust: 0.8

vendor:デルmodel:smartfabric os10scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-018119 // NVD: CVE-2022-34394

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34394
value: LOW

Trust: 1.0

security_alert@emc.com: CVE-2022-34394
value: LOW

Trust: 1.0

NVD: CVE-2022-34394
value: LOW

Trust: 0.8

CNNVD: CNNVD-202209-2908
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2022-34394
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 2.0

NVD: CVE-2022-34394
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-018119 // CNNVD: CNNVD-202209-2908 // NVD: CVE-2022-34394 // NVD: CVE-2022-34394

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.1

problemtype:Illegal certificate verification (CWE-295) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-426710 // JVNDB: JVNDB-2022-018119 // NVD: CVE-2022-34394

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202209-2908

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202209-2908

PATCH

title:Dell SmartFabric OS10 Repair measures for trust management problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=209701

Trust: 0.6

sources: CNNVD: CNNVD-202209-2908

EXTERNAL IDS

db:NVDid:CVE-2022-34394

Trust: 3.3

db:JVNDBid:JVNDB-2022-018119

Trust: 0.8

db:CNNVDid:CNNVD-202209-2908

Trust: 0.7

db:CNVDid:CNVD-2022-69150

Trust: 0.1

db:VULHUBid:VHN-426710

Trust: 0.1

sources: VULHUB: VHN-426710 // JVNDB: JVNDB-2022-018119 // CNNVD: CNNVD-202209-2908 // NVD: CVE-2022-34394

REFERENCES

url:https://www.dell.com/support/kbdoc/en-us/000202974/dsa-2022-293-dell-networking-os10-security-update-for-a-support-assist-vulnerability

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-34394

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34394/

Trust: 0.6

sources: VULHUB: VHN-426710 // JVNDB: JVNDB-2022-018119 // CNNVD: CNNVD-202209-2908 // NVD: CVE-2022-34394

SOURCES

db:VULHUBid:VHN-426710
db:JVNDBid:JVNDB-2022-018119
db:CNNVDid:CNNVD-202209-2908
db:NVDid:CVE-2022-34394

LAST UPDATE DATE

2024-08-14T15:32:31.536000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426710date:2022-09-30T00:00:00
db:JVNDBid:JVNDB-2022-018119date:2023-10-18T08:11:00
db:CNNVDid:CNNVD-202209-2908date:2022-10-08T00:00:00
db:NVDid:CVE-2022-34394date:2022-09-30T17:20:10.670

SOURCES RELEASE DATE

db:VULHUBid:VHN-426710date:2022-09-28T00:00:00
db:JVNDBid:JVNDB-2022-018119date:2023-10-18T00:00:00
db:CNNVDid:CNNVD-202209-2908date:2022-09-28T00:00:00
db:NVDid:CVE-2022-34394date:2022-09-28T21:15:12.897