{"containers":{"cna":{"affected":[{"product":"IPCOMM ipDIO","vendor":"IPCOMM","versions":[{"status":"affected","version":"3.9"}]}],"credits":[{"lang":"en","value":"Aarón Flecha Menéndez of S21Sec reported these vulnerabilities to CISA."}],"datePublic":"2022-03-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"Persistent cross-site scripting (XSS) in the web interface of ipDIO allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into specific fields. The XSS payload will be executed when a legitimate user attempts to upload, copy, download, or delete an existing configuration (Administrative Services)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-09T15:34:32.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}],"solutions":[{"lang":"en","value":"IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page."}],"source":{"advisory":"ICSA-22-062-01","discovery":"EXTERNAL"},"title":"ICSA-22-062-01 IPCOMM ipDIO","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2022-03-03T18:40:00.000Z","ID":"CVE-2022-24432","STATE":"PUBLIC","TITLE":"ICSA-22-062-01 IPCOMM ipDIO"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"IPCOMM ipDIO","version":{"version_data":[{"version_affected":"=","version_name":"3.9","version_value":"3.9"}]}}]},"vendor_name":"IPCOMM"}]}},"credit":[{"lang":"eng","value":"Aarón Flecha Menéndez of S21Sec reported these vulnerabilities to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Persistent cross-site scripting (XSS) in the web interface of ipDIO allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into specific fields. The XSS payload will be executed when a legitimate user attempts to upload, copy, download, or delete an existing configuration (Administrative Services)."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}]},"solution":[{"lang":"en","value":"IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page."}],"source":{"advisory":"ICSA-22-062-01","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:13:56.169Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:55:48.868175Z","id":"CVE-2022-24432","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:43:32.332Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-24432","datePublished":"2022-03-09T15:34:32.203Z","dateReserved":"2022-02-15T00:00:00.000Z","dateUpdated":"2025-04-16T16:43:32.332Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}