{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2758","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","datePublished":"2022-08-31T15:33:03.944Z","dateUpdated":"2025-04-16T16:11:29.230Z","dateReserved":"2022-08-10T00:00:00.000Z"},"containers":{"cna":{"title":"Update","datePublic":"2022-08-16T00:00:00.000Z","providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2022-11-14T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Passwords are not adequately encrypted during the communication process between all versions of LS Industrial Systems (LSIS) Co. Ltd LS Electric XG5000 software prior to V4.0 and LS Electric PLCs: all versions of XGK-CPUU/H/A/S/E prior to V3.50, all versions of XGI-CPUU/UD/H/S/E prior to V3.20, all versions of XGR-CPUH prior to V1.80, all versions of XGB-XBMS prior to V3.00, all versions of XGB-XBCH prior to V1.90, and all versions of XGB-XECH prior to V1.30. This would allow an attacker to identify and decrypt the password of the affected PLCs by sniffing the PLC’s communication traffic."}],"affected":[{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"XG5000","versions":[{"version":"All versions","status":"affected","lessThan":"V4.0","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGB-XECH","versions":[{"version":"All versions","status":"affected","lessThan":"V1.30","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGB-XBCH","versions":[{"version":"All versions","status":"affected","lessThan":"V1.90","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGB-XBMS","versions":[{"version":"All versions","status":"affected","lessThan":"V3.00","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGR-CPUH","versions":[{"version":"All versions","status":"affected","lessThan":"V1.80","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGI-CPUU/UD/H/S/E","versions":[{"version":"All versions","status":"affected","lessThan":"V3.20","versionType":"custom"}]},{"vendor":"LS Industrial Systems (LSIS) Co. Ltd LS Electric","product":"PLC: XGK-CPUU/H/A/S/E","versions":[{"version":"All versions","status":"affected","lessThan":"V3.50","versionType":"custom"}]}],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-02"}],"credits":[{"lang":"en","value":"Hong-Gi Kin of the Korea Internet & Security Agency (KISA) reported this vulnerability."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-326 Inadequate Encryption Strength","cweId":"CWE-326"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:46:04.435Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-02","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:50:15.763986Z","id":"CVE-2022-2758","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:11:29.230Z"}}]}}