{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-42787","assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","state":"PUBLISHED","assignerShortName":"CERTVDE","requesterUserId":"a1e5283b-8f0d-401e-98b2-bc6219c0e8d1","dateReserved":"2022-10-11T13:32:19.672Z","datePublished":"2022-11-10T11:06:20.856Z","dateUpdated":"2025-05-01T19:01:20.740Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Com-Server LC","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server PoE 3 x Isolated","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server 20mA","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server ++","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"AT-Modem-Emulator","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server UL","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.48","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed 100BaseFX","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed 100BaseLX","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed Office 1 Port","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed Office 4 Port","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed Industry","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed OEM","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed Compact","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed Isolated","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed 19\" 1Port","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed 19\" 4Port","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Com-Server Highspeed PoE","vendor":"Wiesemann & Theis","versions":[{"lessThan":"1.76","status":"affected","version":"1.0","versionType":"semver"}]}],"datePublic":"2022-11-07T10:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Multiple W&amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required."}],"value":"Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required."}],"impacts":[{"capecId":"CAPEC-112","descriptions":[{"lang":"en","value":"CAPEC-112 Brute Force"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-330","description":"CWE-330 Use of Insufficiently Random Values","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE","dateUpdated":"2022-12-01T13:56:46.185Z"},"references":[{"url":"https://cert.vde.com/de/advisories/VDE-2022-043"}],"source":{"advisory":"VDE-2022-043","defect":["CERT@VDE#64257"],"discovery":"EXTERNAL"},"title":"Wiesemann & Theis: Small number space for allocating session id in Com-Server family","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:19:04.509Z"},"title":"CVE Program Container","references":[{"url":"https://cert.vde.com/de/advisories/VDE-2022-043","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-01T19:01:02.435905Z","id":"CVE-2022-42787","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-01T19:01:20.740Z"}}]}}