Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-1368 CVE-2022-1522 CVE-2022-1525 |
CWE-ID | CWE-306 CWE-117 CWE-602 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
3D-A1000 Dimensioning System Hardware solutions / Security hardware applicances |
Vendor | Cognex Corporation |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU67057
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-1368
CWE-ID:
CWE-306 - Missing Authentication for Critical Function
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can change the operator account password via webserver commands by monitoring web socket communications from an unauthenticated session and gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3D-A1000 Dimensioning System: 1.0.3 3354
CPE2.3http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67058
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-1522
CWE-ID:
CWE-117 - Improper Output Neutralization for Logs
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to improper output neutralization for logs. A remote attacker can create false logs that show the password as having been changed when it is not, complicating forensics.
MitigationInstall updates from vendor's website.
Vulnerable software versions3D-A1000 Dimensioning System: 1.0.3 3354
CPE2.3http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67059
Risk: High
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-1525
CWE-ID:
CWE-602 - Client-Side Enforcement of Server-Side Security
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a client-side control issue. A remote attacker can inspec and modify the source code of password protected web elements and bypass web access controls.
MitigationInstall updates from vendor's website.
Vulnerable software versions3D-A1000 Dimensioning System: 1.0.3 3354
CPE2.3http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.