{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-33861","assignerOrgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","state":"PUBLISHED","assignerShortName":"Eaton","dateReserved":"2022-06-15T21:05:25.314Z","datePublished":"2024-11-25T08:50:04.170Z","dateUpdated":"2024-11-25T13:57:28.375Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Intelligent Power Protector","vendor":"Eaton","versions":[{"lessThan":"1.71","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a\nway that causes it to accept invalid data."}],"value":"IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a\nway that causes it to accept invalid data."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-345","description":"CWE-345 Insufficient Verification of Data Authenticity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","shortName":"Eaton","dateUpdated":"2024-11-25T08:50:04.170Z"},"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/ETN-VA-2022-1011.pdf"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Eaton has remediated the vulnerabilities in IPP software version 1.71.<br>"}],"value":"Eaton has remediated the vulnerabilities in IPP software version 1.71."}],"source":{"discovery":"UNKNOWN"},"title":"Insufficient verification of authenticity in IPP","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"eaton","product":"intelligent_power_protector","cpes":["cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.71","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-25T13:57:15.676713Z","id":"CVE-2022-33861","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-25T13:57:28.375Z"}}]}}