Логотип exploitDog
bind:CVE-2022-31066
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-31066

Количество 3

Количество 3

nvd логотип

CVE-2022-31066

больше 3 лет назад

EdgeX Foundry is an open source project for building a common open framework for Internet of Things edge computing. Prior to version 2.1.1, the /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus. Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1) to receive a patch. More information about which go modules, docker containers, and snaps contain patches is available in the GitHub Security Advisory. There are currently no known workarounds for this issue.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-g63h-q855-vp3q

больше 3 лет назад

Configuration API in EdgeXFoundry 2.1.0 and earlier exposes message bus credentials to local unauthenticated users

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2022-03934

больше 3 лет назад

Уязвимость компонента /api/v2/config платформы для Интернета вещей EdgeXFoundry, позволяющая нарушителю раскрыть защищаемую информацию и повысить свои привилегии

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-31066

EdgeX Foundry is an open source project for building a common open framework for Internet of Things edge computing. Prior to version 2.1.1, the /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus. Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1) to receive a patch. More information about which go modules, docker containers, and snaps contain patches is available in the GitHub Security Advisory. There are currently no known workarounds for this issue.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-g63h-q855-vp3q

Configuration API in EdgeXFoundry 2.1.0 and earlier exposes message bus credentials to local unauthenticated users

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-03934

Уязвимость компонента /api/v2/config платформы для Интернета вещей EdgeXFoundry, позволяющая нарушителю раскрыть защищаемую информацию и повысить свои привилегии

CVSS3: 5.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу