{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3083","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2022-09-01T18:48:48.881Z","datePublished":"2023-02-01T20:51:54.498Z","dateUpdated":"2025-01-16T21:58:19.964Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"E850 (ZMQ200)","vendor":"Landis+Gyr","versions":[{"status":"affected","version":"All"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Aarón Flecha Menéndez"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Gabriel Vía Echezarreta"},{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"S21Sec"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to&nbsp;CWE-784: Reliance on Cookies Without Validation and Integrity.&nbsp;The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.</p>"}],"value":"All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to CWE-784: Reliance on Cookies Without Validation and Integrity. The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":3.9,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-784","description":"CWE-784 Reliance on Cookies Without Validation and Integrity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-02-01T20:51:54.498Z"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-07"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Landis+Gyr has fixed this vulnerability and recommends users update to the latest version. For information on how to obtain this update, users should reach out to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.landisgyr.com/contact-2/\">Landis+Gyr support</a><span style=\"background-color: rgb(255, 255, 255);\">. </span>\n\n<br>"}],"value":"\nLandis+Gyr has fixed this vulnerability and recommends users update to the latest version. For information on how to obtain this update, users should reach out to  Landis+Gyr support https://www.landisgyr.com/contact-2/ . \n\n\n"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"VINCE 2.0.6","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2022-3083"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:00:10.400Z"},"title":"CVE Program Container","references":[{"tags":["government-resource","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-07"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T20:22:07.879344Z","id":"CVE-2022-3083","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:58:19.964Z"}}]}}