ID

VAR-202203-1519


CVE

CVE-2022-1098


TITLE

Delta Electronics DIAEnergie  Vulnerability in Uncontrolled Search Path Elements

Trust: 0.8

sources: JVNDB: JVNDB-2022-001544

DESCRIPTION

Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking condition. When combined with the Incorrect Default Permissions vulnerability of 4.2.2 above, this makes it possible for an attacker to escalate privileges. Delta Electronics DIAEnergie There is a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2022-1098 // JVNDB: JVNDB-2022-001544

AFFECTED PRODUCTS

vendor:deltawwmodel:diaenergiescope:ltversion:1.8.02.004

Trust: 1.0

vendor:deltamodel:diaenergiescope:eqversion: -

Trust: 0.8

vendor:deltamodel:diaenergiescope:eqversion:1.8.02.004

Trust: 0.8

sources: JVNDB: JVNDB-2022-001544 // NVD: CVE-2022-1098

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-1098
value: HIGH

Trust: 1.8

ics-cert@hq.dhs.gov: CVE-2022-1098
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202203-2491
value: HIGH

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

NVD: CVE-2022-1098
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD:
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov:
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-1098
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-001544 // NVD: CVE-2022-1098 // NVD: CVE-2022-1098 // CNNVD: CNNVD-202203-2491

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.0

problemtype:Uncontrolled search path elements (CWE-427) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-001544 // NVD: CVE-2022-1098

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202203-2491

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202203-2491

CONFIGURATIONS

sources: NVD: CVE-2022-1098

PATCH

title:Top Pageurl:https://www.deltaww.com/en-us/index

Trust: 0.8

title:Delta Electronics DIAEnergie Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=188370

Trust: 0.6

sources: JVNDB: JVNDB-2022-001544 // CNNVD: CNNVD-202203-2491

EXTERNAL IDS

db:NVDid:CVE-2022-1098

Trust: 3.2

db:ICS CERTid:ICSA-22-081-01

Trust: 2.4

db:JVNid:JVNVU99338807

Trust: 0.8

db:JVNDBid:JVNDB-2022-001544

Trust: 0.8

db:CNNVDid:CNNVD-202203-2491

Trust: 0.6

sources: JVNDB: JVNDB-2022-001544 // NVD: CVE-2022-1098 // CNNVD: CNNVD-202203-2491

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01

Trust: 2.4

url:https://jvn.jp/vu/jvnvu99338807/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-1098

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-1098/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-081-01

Trust: 0.6

sources: JVNDB: JVNDB-2022-001544 // NVD: CVE-2022-1098 // CNNVD: CNNVD-202203-2491

CREDITS

Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202203-2491

SOURCES

db:JVNDBid:JVNDB-2022-001544
db:NVDid:CVE-2022-1098
db:CNNVDid:CNNVD-202203-2491

LAST UPDATE DATE

2023-12-18T11:56:27.946000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-001544date:2022-04-18T07:32:00
db:NVDid:CVE-2022-1098date:2022-04-08T20:34:27.077
db:CNNVDid:CNNVD-202203-2491date:2022-04-11T00:00:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-001544date:2022-04-18T00:00:00
db:NVDid:CVE-2022-1098date:2022-04-01T23:15:12.603
db:CNNVDid:CNNVD-202203-2491date:2022-03-29T00:00:00