{"containers":{"cna":{"affected":[{"product":"InRouter302","vendor":"InHand Networks","versions":[{"status":"affected","version":"V3.5.4"}]}],"datePublic":"2022-05-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1004","description":"CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-12T17:01:34.000Z","orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf"},{"tags":["x_refsource_MISC"],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","DATE_PUBLIC":"2022-05-10","ID":"CVE-2022-25172","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"InRouter302","version":{"version_data":[{"version_affected":"=","version_value":"V3.5.4"}]}}]},"vendor_name":"InHand Networks"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie."}]},"impact":{"cvss":{"baseScore":7.5,"baseSeverity":"High","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag"}]}]},"references":{"reference_data":[{"name":"https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf","refsource":"CONFIRM","url":"https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf"},{"name":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470","refsource":"MISC","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:36:06.276Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-15T18:19:11.830876Z","id":"CVE-2022-25172","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T19:03:19.864Z"}}]},"cveMetadata":{"assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","assignerShortName":"talos","cveId":"CVE-2022-25172","datePublished":"2022-05-12T17:01:34.630Z","dateReserved":"2022-02-22T00:00:00.000Z","dateUpdated":"2025-04-15T19:03:19.864Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}