{"containers":{"cna":{"affected":[{"product":"NextSeq 550Dx","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"MiSeq Dx","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"NextSeq 500 Instrument","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"NextSeq 550 Instrument","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"MiSeq Instrument","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"iSeq 100 Instrument","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]},{"product":"MiniSeq Instrument","vendor":"Illumina","versions":[{"status":"affected","version":"LRM Versions 1.3 to 3.1"}]}],"datePublic":"2022-06-02T00:00:00.000Z","descriptions":[{"lang":"en","value":"LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-250","description":"cwe-250","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-24T15:00:12.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02"}],"source":{"discovery":"UNKNOWN"},"title":"3.2.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250","x_legacyV4Record":{"CVE_data_meta":{"AKA":"","ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"20220602T06:00:00.000000Z","ID":"CVE-2022-1517","STATE":"PUBLIC","TITLE":"3.2.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"NextSeq 550Dx","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"MiSeq Dx","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"NextSeq 500 Instrument","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"NextSeq 550 Instrument","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"MiSeq Instrument","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"iSeq 100 Instrument","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"},{"product":{"product_data":[{"product_name":"MiniSeq Instrument","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"","version_value":"LRM Versions 1.3 to 3.1"}]}}]},"vendor_name":"Illumina"}]}},"credit":[],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"cwe-250"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02"}]},"solution":[],"source":{"advisory":"","defect":[],"discovery":"UNKNOWN"},"work_around":[]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:10:02.759Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:54:32.128012Z","id":"CVE-2022-1517","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:17:11.157Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-1517","datePublished":"2022-06-24T15:00:12.934Z","dateReserved":"2022-04-28T00:00:00.000Z","dateUpdated":"2025-04-16T16:17:11.157Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}