{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3929","assignerOrgId":"e383dce4-0c27-4495-91c4-0db157728d17","state":"PUBLISHED","assignerShortName":"Hitachi Energy","dateReserved":"2022-11-10T15:40:42.305Z","datePublished":"2023-01-05T21:54:51.823Z","dateUpdated":"2025-04-10T13:51:12.769Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"FOXMAN-UN","vendor":"Hitachi Energy","versions":[{"status":"unaffected","version":"FOXMAN-UN R16A"},{"status":"affected","version":"FOXMAN-UN R15B"},{"status":"affected","version":"FOXMAN-UN R15A"},{"status":"affected","version":"FOXMAN-UN R14B"},{"status":"affected","version":"FOXMAN-UN R14A"},{"status":"affected","version":"FOXMAN-UN R11B"},{"status":"affected","version":"FOXMAN-UN R11A"},{"status":"affected","version":"FOXMAN-UN R10C"},{"status":"affected","version":"FOXMAN-UN R9C"}]},{"defaultStatus":"unaffected","product":"UNEM","vendor":"Hitachi Energy","versions":[{"status":"unaffected","version":"UNEM R16A"},{"status":"affected","version":"UNEM R15B"},{"status":"affected","version":"UNEM R15A"},{"status":"affected","version":"UNEM R14B"},{"status":"affected","version":"UNEM R14A"},{"status":"affected","version":"UNEM R11B"},{"status":"affected","version":"UNEM R11A"},{"status":"affected","version":"UNEM R10C"},{"status":"affected","version":"UNEM R9C"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"K-Businessom AG, Austria"}],"datePublic":"2022-12-13T13:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\nCommunication between the client and the server application of the affected products is partially done using CORBA (Common Object Request Broker Architecture) over TCP/IP. This protocol is not encrypted and allows tracing of internal messages.<br><p></p><p>This issue affects </p><p></p><ul><li>FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; </li><li>UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.</li></ul><p></p>List of CPEs: <br><ul><li><span style=\"background-color: var(--wht);\">cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*</span><br></li><li>cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*</li><li><span style=\"background-color: var(--wht);\">cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*</span><br></li><li>cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*</li><li>cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*</li></ul><p></p>\n\n<p></p>"}],"value":"\nCommunication between the client and the server application of the affected products is partially done using CORBA (Common Object Request Broker Architecture) over TCP/IP. This protocol is not encrypted and allows tracing of internal messages.\n\n\nThis issue affects \n\n\n\n  *  FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; \n  *  UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.\n\n\n\n\nList of CPEs: \n  *  cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*\n\n  *  cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*\n\n  *  cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*\n  *  cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\n\n\n\n\n\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-158","descriptions":[{"lang":"en","value":"CAPEC-158 Sniffing Network Traffic"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319 Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e383dce4-0c27-4495-91c4-0db157728d17","shortName":"Hitachi Energy","dateUpdated":"2023-01-05T21:54:51.823Z"},"references":[{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch"},{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch"}],"source":{"discovery":"EXTERNAL"},"title":"Communication between the client and server partially using CORBA over TCP/IP","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\nFor immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory<br><ul><li>Secure the NMS CLIENT/SERVER communication.</li></ul>\n\n"}],"value":"\nFor immediate recommended mitigation actions if using FOXMAN-UN R15B or UNEM R15B and earlier, please refer to the multiple clauses of section Mitigation Factors/Workarounds in the advisory\n  *  Secure the NMS CLIENT/SERVER communication.\n\n\n\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.099Z"},"title":"CVE Program Container","references":[{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch","tags":["x_transferred"]},{"url":"https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-10T13:51:05.411841Z","id":"CVE-2022-3929","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-10T13:51:12.769Z"}}]}}