ID

VAR-202204-0257


CVE

CVE-2022-26507


TITLE

AT&T Labs Xmill Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202204-3389

DESCRIPTION

** UNSUPPORTED WHEN ASSIGNED ** A heap-based buffer overflow exists in XML Decompression DecodeTreeBlock in AT&T Labs Xmill 0.7. A crafted input file can lead to remote code execution. This is not the same as any of: CVE-2021-21810, CVE-2021-21811, CVE-2021-21812, CVE-2021-21815, CVE-2021-21825, CVE-2021-21826, CVE-2021-21828, CVE-2021-21829, or CVE-2021-21830. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Trust: 0.99

sources: NVD: CVE-2022-26507 // VULMON: CVE-2022-26507

AFFECTED PRODUCTS

vendor:attmodel:xmillscope:eqversion:0.7

Trust: 1.0

vendor:schneider electricmodel:ecostruxure process expertscope:ltversion:2021

Trust: 1.0

vendor:schneider electricmodel:ecostruxure control expertscope:ltversion:15.1

Trust: 1.0

vendor:schneider electricmodel:ecostruxure control expertscope:eqversion:15.1

Trust: 1.0

vendor:schneider electricmodel:remoteconnectscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2022-26507

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-26507
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202204-3389
value: CRITICAL

Trust: 0.6

VULMON: CVE-2022-26507
value: HIGH

Trust: 0.1

VULMON: CVE-2022-26507
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2022-26507
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2022-26507 // CNNVD: CNNVD-202204-3389 // NVD: CVE-2022-26507

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2022-26507

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202204-3389

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202204-3389

CONFIGURATIONS

sources: NVD: CVE-2022-26507

PATCH

title:AT&T Labs Xmill Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190458

Trust: 0.6

sources: CNNVD: CNNVD-202204-3389

EXTERNAL IDS

db:SCHNEIDERid:SEVD-2021-222-02

Trust: 1.7

db:NVDid:CVE-2022-26507

Trust: 1.7

db:CNNVDid:CNNVD-202204-3389

Trust: 0.6

db:VULMONid:CVE-2022-26507

Trust: 0.1

sources: VULMON: CVE-2022-26507 // CNNVD: CNNVD-202204-3389 // NVD: CVE-2022-26507

REFERENCES

url:https://claroty.com

Trust: 1.7

url:https://download.schneider-electric.com/files?p_doc_ref=sevd-2021-222-02

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2022-26507/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-26507 // CNNVD: CNNVD-202204-3389 // NVD: CVE-2022-26507

SOURCES

db:VULMONid:CVE-2022-26507
db:CNNVDid:CNNVD-202204-3389
db:NVDid:CVE-2022-26507

LAST UPDATE DATE

2022-05-04T09:32:10.215000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-26507date:2022-04-23T00:00:00
db:CNNVDid:CNNVD-202204-3389date:2022-04-24T00:00:00
db:NVDid:CVE-2022-26507date:2022-04-23T02:21:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-26507date:2022-04-14T00:00:00
db:CNNVDid:CNNVD-202204-3389date:2022-04-14T00:00:00
db:NVDid:CVE-2022-26507date:2022-04-14T13:15:00