{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-33862","assignerOrgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","state":"PUBLISHED","assignerShortName":"Eaton","dateReserved":"2022-06-15T21:05:25.314Z","datePublished":"2024-11-25T08:54:39.616Z","dateUpdated":"2024-11-25T13:56:45.587Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Intelligent Power Protector (IPP)","vendor":"Eaton","versions":[{"lessThan":"1.71","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could\nlead attackers to identify and access vulnerable systems."}],"value":"IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could\nlead attackers to identify and access vulnerable systems."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-287","description":"CWE-287 Improper Authentication","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"63703b7d-23e2-41ef-94b3-a3c6333f7759","shortName":"Eaton","dateUpdated":"2024-11-25T08:54:39.616Z"},"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/ETN-VA-2022-1011.pdf"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Eaton has remediated the vulnerabilities in IPP software version 1.71.\n\n<br>"}],"value":"Eaton has remediated the vulnerabilities in IPP software version 1.71."}],"source":{"discovery":"UNKNOWN"},"title":"Improper access control mechanism in IPP","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"eaton","product":"intelligent_power_protector","cpes":["cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.71","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-25T13:56:01.808121Z","id":"CVE-2022-33862","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-25T13:56:45.587Z"}}]}}