{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2052","assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","assignerShortName":"CERTVDE","datePublished":"2022-10-17T08:20:11.346Z","dateUpdated":"2025-05-10T02:57:40.699Z","dateReserved":"2022-06-10T00:00:00.000Z"},"containers":{"cna":{"title":"TRUMPF TruTops default user accounts vulnerability","datePublic":"2022-10-17T00:00:00.000Z","providerMetadata":{"orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE","dateUpdated":"2022-10-17T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Multiple Trumpf Products in multiple versions use default privileged Windows users and passwords. An adversary may use these accounts to remotely gain full access to the system."}],"affected":[{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"TruTops Monitor","versions":[{"version":"All Versions","status":"affected"}]},{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"TruTops Fab","versions":[{"version":"All Versions","status":"affected"}]},{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"Oseon","versions":[{"version":"unspecified","lessThanOrEqual":"1.6","status":"affected","versionType":"custom"}]},{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"Job Order Interface","versions":[{"version":"All Versions","status":"affected"}]},{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"TruTops Boost with option Inventory of sheets and remainder sheets","versions":[{"version":"All Versions","status":"affected"}]},{"vendor":"TRUMPF Werkzeugmaschinen SE + Co. KG","product":"TruTops Boost with option Graphic separation of cut parts","versions":[{"version":"All Versions","status":"affected"}]}],"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2022-023/"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"VDE-2022-023","defect":["CERT@VDE#64131"],"discovery":"INTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:24:44.261Z"},"title":"CVE Program Container","references":[{"url":"https://cert.vde.com/en/advisories/VDE-2022-023/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-10T02:57:27.303845Z","id":"CVE-2022-2052","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-10T02:57:40.699Z"}}]}}