{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4610","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2025-04-15T12:56:37.245Z","dateReserved":"2022-12-19T00:00:00.000Z","datePublished":"2022-12-19T00:00:00.000Z"},"containers":{"cna":{"title":"Click Studios Passwordstate risky encryption","providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-19T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected by this issue is some unknown functionality. The manipulation leads to risky cryptographic algorithm. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216272."}],"affected":[{"vendor":"Click Studios","product":"Passwordstate","versions":[{"version":"n/a","status":"affected"}]},{"vendor":"Click Studios","product":"Passwordstate Browser Extension Chrome","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"},{"url":"https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf"},{"url":"https://vuldb.com/?id.216272"}],"credits":[{"lang":"en","value":"Constantin Müller/Jan Benninger/Pascal Zenker"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":1.9,"baseSeverity":"LOW"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-310 Cryptographic Issues -> CWE-327 Risky Cryptographic Algorithm","cweId":"CWE-310"}]}],"x_generator":"vuldb.com"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:48:38.943Z"},"title":"CVE Program Container","references":[{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html","tags":["x_transferred"]},{"url":"https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf","tags":["x_transferred"]},{"url":"https://vuldb.com/?id.216272","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T16:54:31.766304Z","id":"CVE-2022-4610","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T12:56:37.245Z"}}]}}