ID

VAR-202210-1499


CVE

CVE-2022-3386


TITLE

Advantech Co., Ltd.  R-SeeNet  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019035

DESCRIPTION

Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. Advantech Co., Ltd. R-SeeNet Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech R-SeeNet. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of POST requests sent to the out.php endpoint. When processing the filename and path elements, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Advantech R-SeeNet is an industrial monitoring software developed by China Advantech Company. The software monitors the platform based on the snmp protocol, and is suitable for Linux and Windows platforms. Advantech R-SeeNet

Trust: 2.97

sources: NVD: CVE-2022-3386 // JVNDB: JVNDB-2022-019035 // ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // VULHUB: VHN-431001 // VULMON: CVE-2022-3386

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-16470

AFFECTED PRODUCTS

vendor:advantechmodel:r-seenetscope:lteversion:2.4.17

Trust: 1.0

vendor:アドバンテック株式会社model:r-seenetscope:eqversion: -

Trust: 0.8

vendor:アドバンテック株式会社model:r-seenetscope:lteversion:2.4.17 and earlier

Trust: 0.8

vendor:アドバンテック株式会社model:r-seenetscope: - version: -

Trust: 0.8

vendor:advantechmodel:r-seenetscope: - version: -

Trust: 0.7

vendor:advantechmodel:r-seenetscope:lteversion:<=2.4.17

Trust: 0.6

sources: ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // JVNDB: JVNDB-2022-019035 // NVD: CVE-2022-3386

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-3386
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-3386
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-3386
value: CRITICAL

Trust: 0.8

ZDI: CVE-2022-3386
value: CRITICAL

Trust: 0.7

CNVD: CNVD-2023-16470
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202210-2398
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2023-16470
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-3386
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-3386
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-3386
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // JVNDB: JVNDB-2022-019035 // CNNVD: CNNVD-202210-2398 // NVD: CVE-2022-3386 // NVD: CVE-2022-3386

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-121

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-431001 // JVNDB: JVNDB-2022-019035 // NVD: CVE-2022-3386

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-2398

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202210-2398

PATCH

title:Advantech has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01

Trust: 0.7

title:Patch for Advantech R-SeeNet stack buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/413481

Trust: 0.6

title:Advantech R-SeeNet Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=212345

Trust: 0.6

title: - url:https://www.theregister.co.uk/2022/10/20/cisa_flaws_advantech_hitachi/

Trust: 0.1

sources: ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // VULMON: CVE-2022-3386 // CNNVD: CNNVD-202210-2398

EXTERNAL IDS

db:NVDid:CVE-2022-3386

Trust: 4.7

db:ICS CERTid:ICSA-22-291-01

Trust: 2.6

db:JVNid:JVNVU97893771

Trust: 0.8

db:JVNDBid:JVNDB-2022-019035

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-17392

Trust: 0.7

db:ZDIid:ZDI-22-1450

Trust: 0.7

db:CNVDid:CNVD-2023-16470

Trust: 0.6

db:CNNVDid:CNNVD-202210-2398

Trust: 0.6

db:VULHUBid:VHN-431001

Trust: 0.1

db:VULMONid:CVE-2022-3386

Trust: 0.1

sources: ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // VULHUB: VHN-431001 // VULMON: CVE-2022-3386 // JVNDB: JVNDB-2022-019035 // CNNVD: CNNVD-202210-2398 // NVD: CVE-2022-3386

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01

Trust: 3.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-3386

Trust: 1.4

url:https://jvn.jp/vu/jvnvu97893771/

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-3386/

Trust: 0.6

url:https://www.theregister.co.uk/2022/10/20/cisa_flaws_advantech_hitachi/

Trust: 0.1

sources: ZDI: ZDI-22-1450 // CNVD: CNVD-2023-16470 // VULHUB: VHN-431001 // VULMON: CVE-2022-3386 // JVNDB: JVNDB-2022-019035 // CNNVD: CNNVD-202210-2398 // NVD: CVE-2022-3386

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-22-1450

SOURCES

db:ZDIid:ZDI-22-1450
db:CNVDid:CNVD-2023-16470
db:VULHUBid:VHN-431001
db:VULMONid:CVE-2022-3386
db:JVNDBid:JVNDB-2022-019035
db:CNNVDid:CNNVD-202210-2398
db:NVDid:CVE-2022-3386

LAST UPDATE DATE

2024-08-14T13:42:18.936000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1450date:2022-10-21T00:00:00
db:CNVDid:CNVD-2023-16470date:2023-03-13T00:00:00
db:VULHUBid:VHN-431001date:2022-10-28T00:00:00
db:JVNDBid:JVNDB-2022-019035date:2023-10-24T06:54:00
db:CNNVDid:CNNVD-202210-2398date:2022-10-31T00:00:00
db:NVDid:CVE-2022-3386date:2023-11-07T03:51:12.170

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1450date:2022-10-21T00:00:00
db:CNVDid:CNVD-2023-16470date:2023-03-13T00:00:00
db:VULHUBid:VHN-431001date:2022-10-27T00:00:00
db:JVNDBid:JVNDB-2022-019035date:2023-10-24T00:00:00
db:CNNVDid:CNNVD-202210-2398date:2022-10-27T00:00:00
db:NVDid:CVE-2022-3386date:2022-10-27T21:15:13.273