CVE-2022-1318
Published Apr 20, 2022
Last updated a year ago
Overview
- Description
- Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:carrier:hills_comnav_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "073EE70E-008B-4B42-BC73-129FCC6F4CE5", "versionEndIncluding": "3002-19" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:carrier:hills_comnav:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "54B62437-9B6B-43DB-B9A1-C8E4091D829D" } ], "operator": "OR" } ], "operator": "AND" } ]