{"containers":{"cna":{"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"unknown"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi.<br>Security information ID hitachi-sec-2022-001 contains fixes for the issue."}],"value":"An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue."}],"impacts":[{"descriptions":[{"lang":"en","value":"System Reboot"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"n/a"}]}],"providerMetadata":{"dateUpdated":"2024-01-04T20:55:09.486Z","orgId":"50d0f415-c707-4733-9afc-8f6c0e9b3f82","shortName":"mitre"},"references":[{"tags":["third-party-advisory","broken-link"],"url":"https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5","name":"https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5"},{"tags":["vendor-advisory"],"url":"https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec-2022-001/index.html","name":"https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec-2022-001/index.html"}],"source":{"advisory":"hitachi-sec-2022-001","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:29:21.080Z"},"title":"CVE Program Container","references":[{"tags":["third-party-advisory","broken-link","x_transferred"],"url":"https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5","name":"https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5"},{"tags":["vendor-advisory","x_transferred"],"url":"https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec-2022-001/index.html","name":"https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec-2022-001/index.html"}]}]},"cveMetadata":{"assignerOrgId":"50d0f415-c707-4733-9afc-8f6c0e9b3f82","assignerShortName":"mitre","cveId":"CVE-2022-37680","datePublished":"2022-08-29T13:46:00.000Z","dateReserved":"2022-08-07T15:00:00.000Z","dateUpdated":"2025-02-13T16:32:55.711Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}