ID

VAR-202210-1397


CVE

CVE-2022-35884


TITLE

Abode Systems, Inc.  of  Abode iota All-In-One Security Kit  Format string vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-019826

DESCRIPTION

Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `ssid_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler. Abode Systems, Inc. of Abode iota All-In-One Security Kit A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Abode Iota is a solid DIY home security system from Abode Corporation

Trust: 2.25

sources: NVD: CVE-2022-35884 // JVNDB: JVNDB-2022-019826 // CNNVD: CNNVD-202210-1476 // VULHUB: VHN-432126

AFFECTED PRODUCTS

vendor:goabodemodel:iota all-in-one security kitscope:eqversion:6.9z

Trust: 1.0

vendor:goabodemodel:iota all-in-one security kitscope:eqversion:6.9x

Trust: 1.0

vendor:abodemodel:iota all-in-one security kitscope:eqversion:abode iota all-in-one security kit firmware 6.9z

Trust: 0.8

vendor:abodemodel:iota all-in-one security kitscope:eqversion: -

Trust: 0.8

vendor:abodemodel:iota all-in-one security kitscope:eqversion:abode iota all-in-one security kit firmware 6.9x

Trust: 0.8

vendor:abodemodel:iota all-in-one security kitscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019826 // NVD: CVE-2022-35884

CVSS

SEVERITY

CVSSV2

CVSSV3

talos-cna@cisco.com: CVE-2022-35884
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2022-35884
value: HIGH

Trust: 1.0

NVD: CVE-2022-35884
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202210-1476
value: HIGH

Trust: 0.6

talos-cna@cisco.com: CVE-2022-35884
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.2
version: 3.0

Trust: 1.0

nvd@nist.gov: CVE-2022-35884
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-35884
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019826 // CNNVD: CNNVD-202210-1476 // NVD: CVE-2022-35884 // NVD: CVE-2022-35884

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.0

problemtype:Format string problem (CWE-134) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019826 // NVD: CVE-2022-35884

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1476

TYPE

format string error

Trust: 0.6

sources: CNNVD: CNNVD-202210-1476

EXTERNAL IDS

db:NVDid:CVE-2022-35884

Trust: 3.3

db:TALOSid:TALOS-2022-1585

Trust: 2.5

db:JVNDBid:JVNDB-2022-019826

Trust: 0.8

db:CNNVDid:CNNVD-202210-1476

Trust: 0.6

db:VULHUBid:VHN-432126

Trust: 0.1

sources: VULHUB: VHN-432126 // JVNDB: JVNDB-2022-019826 // CNNVD: CNNVD-202210-1476 // NVD: CVE-2022-35884

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2022-1585

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35884

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-35884/

Trust: 0.6

sources: VULHUB: VHN-432126 // JVNDB: JVNDB-2022-019826 // CNNVD: CNNVD-202210-1476 // NVD: CVE-2022-35884

CREDITS

Discovered by Matt Wiseman of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-202210-1476

SOURCES

db:VULHUBid:VHN-432126
db:JVNDBid:JVNDB-2022-019826
db:CNNVDid:CNNVD-202210-1476
db:NVDid:CVE-2022-35884

LAST UPDATE DATE

2024-08-14T14:24:28.984000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-432126date:2022-10-27T00:00:00
db:JVNDBid:JVNDB-2022-019826date:2023-10-27T08:13:00
db:CNNVDid:CNNVD-202210-1476date:2022-10-31T00:00:00
db:NVDid:CVE-2022-35884date:2022-10-27T15:17:58.400

SOURCES RELEASE DATE

db:VULHUBid:VHN-432126date:2022-10-25T00:00:00
db:JVNDBid:JVNDB-2022-019826date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202210-1476date:2022-10-20T00:00:00
db:NVDid:CVE-2022-35884date:2022-10-25T17:15:54.960