{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3186","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2022-09-12T20:22:40.302Z","datePublished":"2022-12-21T22:28:58.579Z","dateUpdated":"2025-04-15T19:34:02.557Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"iBoot-PDU FW","vendor":"Dataprobe","versions":[{"lessThanOrEqual":"1.42.06162022","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Uri Katz"},{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Claroty Research"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">where the&nbsp;</span><span style=\"background-color: var(--wht);\">affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information.</span></p>"}],"value":"Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"CWE-284 Improper Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2022-12-21T22:28:58.579Z"},"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-03"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>Dataprobe has released the following version update to mitigate these vulnerabilities:</p><ul><li>iBoot-PDU FW: <a target=\"_blank\" rel=\"nofollow\" href=\"https://dataprobe.com/support-iboot-pdu/\">Version 1.42.06162022</a></li></ul><p>Dataprobe also recommends users to disable the SNMP if it is not in use. </p>\n\n<br>"}],"value":"\nDataprobe has released the following version update to mitigate these vulnerabilities:\n\n  *  iBoot-PDU FW:  Version 1.42.06162022 https://dataprobe.com/support-iboot-pdu/ \n\n\nDataprobe also recommends users to disable the SNMP if it is not in use. \n\n\n\n\n"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:00:10.684Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-03","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-15T19:33:52.543093Z","id":"CVE-2022-3186","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T19:34:02.557Z"}}]}}