{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-47311","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2022-12-21T17:02:52.831Z","datePublished":"2023-05-22T22:12:51.152Z","dateUpdated":"2025-01-16T21:32:39.562Z"},"containers":{"cna":{"title":"CVE-2022-47311","descriptions":[{"lang":"en","value":"A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection."}],"source":{"discovery":"UNKNOWN"},"affected":[{"vendor":"Dataprobe, Inc.","product":"Dataprobe iBoot-PDU FW","versions":[{"status":"affected","version":"0","lessThan":"1.42.06162022","versionType":"custom"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel"}]}],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03"},{"url":"https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N","baseScore":8.5,"baseSeverity":"HIGH"}}],"x_generator":{"engine":"VINCE 2.1.1","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2022-47311"},"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-05-22T22:12:51.152Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:47:29.368Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03","tags":["x_transferred"]},{"url":"https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T20:21:00.772667Z","id":"CVE-2022-47311","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:32:39.562Z"}}]}}