CVE-2022-21828
Published Mar 4, 2022
Last updated 3 years ago
Overview
- Description
- A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3.
- Source
- support@hackerone.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- support@hackerone.com
- CWE-502
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.35.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84D66A38-99B0-4D11-B537-1365427A2B8E" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.35.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7620D67A-3F0A-47B5-9A8E-ABB74F5811B6" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.35.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "664E657A-47AB-47EA-B123-DE8FB27F3324" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.36.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2769912-EE72-4F82-A965-38FB85D249D6" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.37.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A62F84DF-87AE-4747-8BC5-13DDF5D304F6" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.37.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32126789-6BF1-4FC0-B419-0E9978F5C646" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.38.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5943C9D-5329-45EF-AF66-59AD34D157B3" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.38.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B30CC96E-0351-47A2-A076-9BDA9D41298F" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.39.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55A30D9B-927D-4F0B-B6CC-A9BF07150381" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.39.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37C09E2C-4859-4A4B-A136-8CC46376CF3A" }, { "criteria": "cpe:2.3:a:ivanti:incapptic_connect:1.40.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D46B01F3-E9AE-4C2A-AD8D-28FFF049F7AE" } ], "operator": "OR" } ] } ]