ID

VAR-202305-0189


CVE

CVE-2022-48483


TITLE

3CX  of  3cx  Past traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-009865

DESCRIPTION

3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005. 3CX of 3cx Exists in a past traversal vulnerability.Information may be obtained

Trust: 1.71

sources: NVD: CVE-2022-48483 // JVNDB: JVNDB-2023-009865 // VULMON: CVE-2022-48483

AFFECTED PRODUCTS

vendor:3cxmodel:3cxscope:ltversion:18.0.3.461

Trust: 1.0

vendor:3cxmodel:3cxscope:eqversion:18.0.3.461

Trust: 0.8

vendor:3cxmodel:3cxscope:eqversion: -

Trust: 0.8

vendor:3cxmodel:3cxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-009865 // NVD: CVE-2022-48483

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-48483
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-48483
value: HIGH

Trust: 1.0

NVD: CVE-2022-48483
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202305-074
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-48483
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-48483
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-009865 // CNNVD: CNNVD-202305-074 // NVD: CVE-2022-48483 // NVD: CVE-2022-48483

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-009865 // NVD: CVE-2022-48483

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202305-074

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202305-074

PATCH

title:3CX Repair measures for path traversal vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=236961

Trust: 0.6

sources: CNNVD: CNNVD-202305-074

EXTERNAL IDS

db:NVDid:CVE-2022-48483

Trust: 3.3

db:JVNDBid:JVNDB-2023-009865

Trust: 0.8

db:CNNVDid:CNNVD-202305-074

Trust: 0.6

db:VULMONid:CVE-2022-48483

Trust: 0.1

sources: VULMON: CVE-2022-48483 // JVNDB: JVNDB-2023-009865 // CNNVD: CNNVD-202305-074 // NVD: CVE-2022-48483

REFERENCES

url:https://www.3cx.com/blog/change-log/phone-system-change-log/

Trust: 2.5

url:https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-48483

Trust: 0.8

url:https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88

Trust: 0.7

url:https://cxsecurity.com/cveshow/cve-2022-48483/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-48483 // JVNDB: JVNDB-2023-009865 // CNNVD: CNNVD-202305-074 // NVD: CVE-2022-48483

SOURCES

db:VULMONid:CVE-2022-48483
db:JVNDBid:JVNDB-2023-009865
db:CNNVDid:CNNVD-202305-074
db:NVDid:CVE-2022-48483

LAST UPDATE DATE

2025-01-31T23:12:52.706000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-48483date:2023-05-02T00:00:00
db:JVNDBid:JVNDB-2023-009865date:2023-12-07T01:58:00
db:CNNVDid:CNNVD-202305-074date:2023-05-11T00:00:00
db:NVDid:CVE-2022-48483date:2025-01-30T17:15:12.333

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-48483date:2023-05-02T00:00:00
db:JVNDBid:JVNDB-2023-009865date:2023-12-07T00:00:00
db:CNNVDid:CNNVD-202305-074date:2023-05-02T00:00:00
db:NVDid:CVE-2022-48483date:2023-05-02T05:15:28.057