ID

VAR-202211-1282


CVE

CVE-2022-3086


TITLE

Cradlepoint IBR600 Command injection vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202211-3008

DESCRIPTION

Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.

Trust: 1.0

sources: NVD: CVE-2022-3086

AFFECTED PRODUCTS

vendor:moxamodel:uc-3111-t-us-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8410a-lxscope:eqversion:2.2

Trust: 1.0

vendor:moxamodel:uc-5112-t-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8580-t-ct-q-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-eu-sscope:lteversion:2.4

Trust: 1.0

vendor:moxamodel:uc-3121-t-ap-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3101-t-us-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8540-t-ct-lxscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-8220-t-lxscope:lteversion:2.4

Trust: 1.0

vendor:moxamodel:uc-8580-q-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-8540-lxscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-3121-t-us-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-5111-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-2111-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-8410a-nw-t-lxscope:eqversion:2.2

Trust: 1.0

vendor:moxamodel:uc-2104-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-5111-t-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8162-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8410a-t-lxscope:eqversion:2.2

Trust: 1.0

vendor:moxamodel:uc-8132-lxscope:eqversion:1.3

Trust: 1.0

vendor:moxamodel:uc-3101-t-eu-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-3121-t-us-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-2114-t-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-2116-t-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-8112a-me-t-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-8132-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-ap-sscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-3121-t-ap-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-8112-lxscope:eqversion:1.3

Trust: 1.0

vendor:moxamodel:uc-8580-t-ct-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-eu-sscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-5101-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8540-t-ct-lxscope:lteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-ap-sscope:lteversion:2.4

Trust: 1.0

vendor:moxamodel:uc-3101-t-eu-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8210-t-lx-sscope:lteversion:2.4

Trust: 1.0

vendor:moxamodel:uc-8540-t-lxscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-8540-lxscope:lteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8580-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-2114-t-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-8580-t-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-2112-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-2116-t-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-3101-t-ap-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-2101-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-8131-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-5102-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-us-sscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-8410a-nw-lxscope:eqversion:2.2

Trust: 1.0

vendor:moxamodel:uc-8162-lxscope:eqversion:1.3

Trust: 1.0

vendor:moxamodel:uc-3111-t-us-lx-nwscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3101-t-ap-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-3111-t-ap-lx-nwscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3111-t-eu-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-2102-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-3121-t-eu-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3111-t-eu-lx-nwscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-2112-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-3111-t-ap-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-8540-t-lxscope:lteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8210-t-lx-sscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-5112-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3111-t-us-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-2101-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-8112a-me-t-lxscope:eqversion:1.0

Trust: 1.0

vendor:moxamodel:uc-3111-t-us-lx-nwscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-5101-t-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3111-t-ap-lx-nwscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-8220-t-lx-us-sscope:lteversion:2.4

Trust: 1.0

vendor:moxamodel:uc-3101-t-us-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-3121-t-eu-lxscope:lteversion:2.0

Trust: 1.0

vendor:moxamodel:uc-3111-t-eu-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-8112-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-3111-t-eu-lx-nwscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-5102-t-lxscope:eqversion:1.2

Trust: 1.0

vendor:moxamodel:uc-2102-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-8580-t-q-lxscope:eqversion:1.1

Trust: 1.0

vendor:moxamodel:uc-2104-lxscope:gteversion:1.3

Trust: 1.0

vendor:moxamodel:uc-8220-t-lxscope:gteversion:1.0

Trust: 1.0

vendor:moxamodel:uc-3111-t-ap-lxscope:gteversion:1.2

Trust: 1.0

vendor:moxamodel:uc-2111-lxscope:lteversion:1.5

Trust: 1.0

vendor:moxamodel:uc-8131-lxscope:eqversion:1.3

Trust: 1.0

sources: NVD: CVE-2022-3086

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-3086
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-3086
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202211-3008
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-3086
baseSeverity: HIGH
baseScore: 7.6
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 6.0
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-3086
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202211-3008 // NVD: CVE-2022-3086 // NVD: CVE-2022-3086

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2022-3086

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202211-3008

PATCH

title:Cradlepoint IBR600 Fixes for command injection vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=214575

Trust: 0.6

sources: CNNVD: CNNVD-202211-3008

EXTERNAL IDS

db:ICS CERTid:ICSA-22-321-02

Trust: 1.7

db:NVDid:CVE-2022-3086

Trust: 1.7

db:AUSCERTid:ESB-2022.6061

Trust: 0.6

db:ICS CERTid:ICSA-22-333-04

Trust: 0.6

db:CNNVDid:CNNVD-202211-3008

Trust: 0.6

db:VULMONid:CVE-2022-3086

Trust: 0.1

sources: VULMON: CVE-2022-3086 // CNNVD: CNNVD-202211-3008 // NVD: CVE-2022-3086

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02

Trust: 1.7

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6061

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-3086/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-321-02

Trust: 0.6

sources: VULMON: CVE-2022-3086 // CNNVD: CNNVD-202211-3008 // NVD: CVE-2022-3086

CREDITS

Uri Katz of Claroty Research reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202211-3008

SOURCES

db:VULMONid:CVE-2022-3086
db:CNNVDid:CNNVD-202211-3008
db:NVDid:CVE-2022-3086

LAST UPDATE DATE

2024-08-14T14:24:27.147000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202211-3008date:2022-12-08T00:00:00
db:NVDid:CVE-2022-3086date:2023-11-07T03:50:46.100

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202211-3008date:2022-11-17T00:00:00
db:NVDid:CVE-2022-3086date:2022-12-02T20:15:13.767