CVE-2022-21215
Published Feb 18, 2022
Last updated 3 years ago
Overview
- Description
- This vulnerability could allow an attacker to force the server to create and execute a web request granting access to backend APIs that are only accessible to the Mimosa MMP server, or request pages that could perform some actions themselves. The attacker could force the server into accessing routes on those cloud-hosting platforms, accessing secret keys, changing configurations, etc. Affecting MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:airspan:mimosa_management_platform:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "064DE49C-CD3C-43AF-864E-D8373EAD9B52", "versionEndExcluding": "1.0.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c6x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4650A7AA-DD66-4A8B-BB37-4D6789D60B85", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c6x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "080058F5-00C3-4204-8942-18D5347614B2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c5x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C295D0C-2C21-474D-B38F-0EA15FB59113", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c5x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2C3239C7-ADFF-413E-86CD-EDBD86FB1ACB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:c5c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31B5039E-8D62-4EB8-A264-1DBA97CC7289", "versionEndExcluding": "2.8.6.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:c5c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9944E65E-56D0-4010-B27B-FD7FE469EC20" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:airspan:a5x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECA42797-2BBB-4622-9F57-2BE53E3D8019", "versionEndExcluding": "2.5.4.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:airspan:a5x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1009C19-795D-4F1A-8C82-A22754E0EBC4" } ], "operator": "OR" } ], "operator": "AND" } ]