{"containers":{"cna":{"affected":[{"product":"IPCOMM ipDIO","vendor":"IPCOMM","versions":[{"status":"affected","version":"3.9"}]}],"credits":[{"lang":"en","value":"Aarón Flecha Menéndez of S21Sec reported these vulnerabilities to CISA."}],"datePublic":"2022-03-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-09T15:33:11.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}],"solutions":[{"lang":"en","value":"IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page."}],"source":{"advisory":"ICSA-22-062-01","discovery":"EXTERNAL"},"title":"ICSA-22-062-01 IPCOMM ipDIO","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2022-03-03T18:40:00.000Z","ID":"CVE-2022-21146","STATE":"PUBLIC","TITLE":"ICSA-22-062-01 IPCOMM ipDIO"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"IPCOMM ipDIO","version":{"version_data":[{"version_affected":"=","version_name":"3.9","version_value":"3.9"}]}}]},"vendor_name":"IPCOMM"}]}},"credit":[{"lang":"eng","value":"Aarón Flecha Menéndez of S21Sec reported these vulnerabilities to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}]},"solution":[{"lang":"en","value":"IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page."}],"source":{"advisory":"ICSA-22-062-01","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:31:59.864Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:55:53.508037Z","id":"CVE-2022-21146","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:43:40.322Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-21146","datePublished":"2022-03-09T15:33:11.554Z","dateReserved":"2022-02-15T00:00:00.000Z","dateUpdated":"2025-04-16T16:43:40.322Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}