Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-29518

Опубликовано: 18 мая 2022
Источник: nvd
CVSS3: 7
CVSS2: 5.9
EPSS Низкий

Описание

Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting's account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:koyoele:remote_gc:-:*:*:*:*:*:*:*
cpe:2.3:a:koyoele:screen_creator_advance_2:*:*:*:*:*:*:*:*
Версия до 0.1.1.3 (исключая)
cpe:2.3:a:koyoele:screen_creator_advance_2:0.1.1.3:-:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:koyoele:gc-a22w-cw_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a22w-cw:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:koyoele:gc-a24_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:koyoele:gc-a24-m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24-m:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:koyoele:gc-a24w-c\(w\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24w-c\(w\):-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:koyoele:gc-a25_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a25:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:koyoele:gc-a26_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26:-:*:*:*:*:*:*:*
Конфигурация 8

Одновременно

cpe:2.3:o:koyoele:gc-a26-j2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26-j2:-:*:*:*:*:*:*:*
Конфигурация 9

Одновременно

cpe:2.3:o:koyoele:gc-a26w-c\(w\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26w-c\(w\):-:*:*:*:*:*:*:*

EPSS

Процентиль: 13%
0.00042
Низкий

7 High

CVSS3

5.9 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

CVSS3: 7
github
больше 3 лет назад

Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting's account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.

EPSS

Процентиль: 13%
0.00042
Низкий

7 High

CVSS3

5.9 Medium

CVSS2

Дефекты

NVD-CWE-Other