ID

VAR-202210-1437


CVE

CVE-2022-3387


TITLE

Advantech Co., Ltd.  R-SeeNet  Past traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019033

DESCRIPTION

Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. Advantech Co., Ltd. R-SeeNet Exists in a past traversal vulnerability.Information may be tampered with. This vulnerability allows remote attackers to disclose sensitive information and delete arbitrary files on affected installations of Advantech R-SeeNet. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the filename and path parameters provided to the out.php endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information and delete files in the context of SYSTEM. Advantech R-SeeNet is an industrial monitoring software developed by China Advantech Company. The software monitors the platform based on the snmp protocol, and is suitable for Linux and Windows platforms. Advantech R-SeeNet

Trust: 2.97

sources: NVD: CVE-2022-3387 // JVNDB: JVNDB-2022-019033 // ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // VULHUB: VHN-431002 // VULMON: CVE-2022-3387

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-16469

AFFECTED PRODUCTS

vendor:advantechmodel:r-seenetscope:lteversion:2.4.19

Trust: 1.0

vendor:アドバンテック株式会社model:r-seenetscope:eqversion: -

Trust: 0.8

vendor:アドバンテック株式会社model:r-seenetscope: - version: -

Trust: 0.8

vendor:アドバンテック株式会社model:r-seenetscope:lteversion:2.4.19 and earlier

Trust: 0.8

vendor:advantechmodel:r-seenetscope: - version: -

Trust: 0.7

vendor:advantechmodel:r-seenetscope:lteversion:<=2.4.19

Trust: 0.6

sources: ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // JVNDB: JVNDB-2022-019033 // NVD: CVE-2022-3387

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-3387
value: MEDIUM

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-3387
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-3387
value: MEDIUM

Trust: 0.8

ZDI: CVE-2022-3387
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2023-16469
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202210-2396
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2023-16469
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-3387
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-3387
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-3387
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-3387
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // JVNDB: JVNDB-2022-019033 // CNNVD: CNNVD-202210-2396 // NVD: CVE-2022-3387 // NVD: CVE-2022-3387

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:Path traversal (CWE-22) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-431002 // JVNDB: JVNDB-2022-019033 // NVD: CVE-2022-3387

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-2396

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202210-2396

PATCH

title:Advantech has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01

Trust: 0.7

title:Patch for Advantech R-SeeNet Directory Traversal Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/413476

Trust: 0.6

title:Advantech R-SeeNet Repair measures for path traversal vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=212344

Trust: 0.6

sources: ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // CNNVD: CNNVD-202210-2396

EXTERNAL IDS

db:NVDid:CVE-2022-3387

Trust: 4.7

db:ICS CERTid:ICSA-22-291-01

Trust: 2.6

db:JVNid:JVNVU97893771

Trust: 0.8

db:JVNDBid:JVNDB-2022-019033

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-17391

Trust: 0.7

db:ZDIid:ZDI-22-1449

Trust: 0.7

db:CNVDid:CNVD-2023-16469

Trust: 0.6

db:CNNVDid:CNNVD-202210-2396

Trust: 0.6

db:VULHUBid:VHN-431002

Trust: 0.1

db:VULMONid:CVE-2022-3387

Trust: 0.1

sources: ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // VULHUB: VHN-431002 // VULMON: CVE-2022-3387 // JVNDB: JVNDB-2022-019033 // CNNVD: CNNVD-202210-2396 // NVD: CVE-2022-3387

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01

Trust: 3.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-3387

Trust: 1.4

url:https://jvn.jp/vu/jvnvu97893771/

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-3387/

Trust: 0.6

sources: ZDI: ZDI-22-1449 // CNVD: CNVD-2023-16469 // VULHUB: VHN-431002 // VULMON: CVE-2022-3387 // JVNDB: JVNDB-2022-019033 // CNNVD: CNNVD-202210-2396 // NVD: CVE-2022-3387

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-22-1449

SOURCES

db:ZDIid:ZDI-22-1449
db:CNVDid:CNVD-2023-16469
db:VULHUBid:VHN-431002
db:VULMONid:CVE-2022-3387
db:JVNDBid:JVNDB-2022-019033
db:CNNVDid:CNNVD-202210-2396
db:NVDid:CVE-2022-3387

LAST UPDATE DATE

2024-08-14T13:42:18.862000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1449date:2022-10-21T00:00:00
db:CNVDid:CNVD-2023-16469date:2023-03-13T00:00:00
db:VULHUBid:VHN-431002date:2022-10-28T00:00:00
db:JVNDBid:JVNDB-2022-019033date:2023-10-24T06:16:00
db:CNNVDid:CNNVD-202210-2396date:2022-10-31T00:00:00
db:NVDid:CVE-2022-3387date:2023-11-07T03:51:12.303

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1449date:2022-10-21T00:00:00
db:CNVDid:CNVD-2023-16469date:2023-03-13T00:00:00
db:VULHUBid:VHN-431002date:2022-10-27T00:00:00
db:JVNDBid:JVNDB-2022-019033date:2023-10-24T00:00:00
db:CNNVDid:CNNVD-202210-2396date:2022-10-27T00:00:00
db:NVDid:CVE-2022-3387date:2022-10-27T21:15:13.443