{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-24037","assignerOrgId":"ca940d4e-fea4-4aa2-9a58-591a58b1ce21","assignerShortName":"TR-CERT","datePublished":"2022-11-18T07:15:16.944Z","dateUpdated":"2024-09-16T20:12:19.327Z","dateReserved":"2022-01-27T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Infraskope SIEM+","vendor":"Karmasis Informatics","versions":[{"lessThan":"7.10.xx","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Gokhan SAHIN"}],"datePublic":"2022-11-17T21:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\n\nKarmasis Informatics Infraskope SIEM+\n\n has an unauthenticated access vulnerability which could allow an unauthenticated attacker to obtain critical information.</p>"}],"value":"Karmasis Informatics Infraskope SIEM+\n\n has an unauthenticated access vulnerability which could allow an unauthenticated attacker to obtain critical information."}],"impacts":[{"capecId":"CAPEC-22","descriptions":[{"lang":"en","value":"CAPEC-22 Exploiting Trust in Client"}]},{"capecId":"CAPEC-37","descriptions":[{"lang":"en","value":"CAPEC-37 Retrieve Embedded Sensitive Data"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ca940d4e-fea4-4aa2-9a58-591a58b1ce21","shortName":"TR-CERT","dateUpdated":"2023-04-16T10:49:24.135Z"},"references":[{"tags":["government-resource"],"url":"https://www.usom.gov.tr/bildirim/tr-22-0691"},{"tags":["product"],"url":"https://karmasis.com/urunlerimiz/infraskope-siem/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\n\nUpdate the Karmasis Informatics Infraskope SIEM+ software to &gt;= 7.10.xx.\n\n </p>"}],"value":"Update the Karmasis Informatics Infraskope SIEM+ software to >= 7.10.xx."}],"source":{"advisory":"TR-22-0691","defect":["TR-22-0691"],"discovery":"EXTERNAL"},"title":"Unauthorized modification in Karmasis Informatics Infraskope SIEM+","x_generator":{"engine":"Vulnogram 0.0.9"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:59:23.448Z"},"title":"CVE Program Container","references":[{"tags":["government-resource","x_transferred"],"url":"https://www.usom.gov.tr/bildirim/tr-22-0691"},{"tags":["product","x_transferred"],"url":"https://karmasis.com/urunlerimiz/infraskope-siem/"}]}]}}