CVE-2022-4874 (GCVE-0-2022-4874)
Vulnerability from cvelistv5
Published
2023-01-11 20:39
Modified
2025-04-09 14:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the existence of specific characters in the URL (.css, .png etc). If it exists, it performs a "fake login" to give the request an active session to load the file and not redirect to the login page.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md | Exploit, Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:46.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-4874", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:13:36.023102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:14:13.898Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "NF20", "vendor": "Netcomm", "versions": [ { "status": "affected", "version": "R6B025" } ] }, { "product": "NF20MESH", "vendor": "Netcomm", "versions": [ { "status": "affected", "version": "R6B025" } ] }, { "product": "NL1902", "vendor": "Netcomm", "versions": [ { "status": "affected", "version": "R6B025" } ] } ], "descriptions": [ { "lang": "en", "value": "Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the existence of specific characters in the URL (.css, .png etc). If it exists, it performs a \"fake login\" to give the request an active session to load the file and not redirect to the login page." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-288", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T20:39:25.219Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "url": "https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows unauthenticated user to get access to content.", "x_generator": { "engine": "VINCE 2.0.5", "env": "prod", "origin": "https://cveawg.mitre.org/api//cve/CVE-2022-4874" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2022-4874", "datePublished": "2023-01-11T20:39:25.219Z", "dateReserved": "2023-01-04T14:23:54.409Z", "dateUpdated": "2025-04-09T14:14:13.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-4874\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2023-01-11T21:15:10.373\",\"lastModified\":\"2025-04-09T15:15:55.690\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the existence of specific characters in the URL (.css, .png etc). If it exists, it performs a \\\"fake login\\\" to give the request an active session to load the file and not redirect to the login page.\"},{\"lang\":\"es\",\"value\":\"La omisi\u00f3n de autenticaci\u00f3n en los modelos de router Netcomm NF20MESH, NF20 y NL1902 permite que un usuario no autenticado acceda al contenido. Para ofrecer contenido est\u00e1tico, la aplicaci\u00f3n verifica la existencia de caracteres espec\u00edficos en la URL (.css, .png, etc.). Si existe, realiza un \\\"inicio de sesi\u00f3n falso\\\" para darle a la solicitud una sesi\u00f3n activa para cargar el archivo y no redirigir a la p\u00e1gina de inicio de sesi\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netcommwireless:nf20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r6b025\",\"matchCriteriaId\":\"447DAC30-D02D-43A7-9C11-9B29D3AE6292\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netcommwireless:nf20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BF282B-6B02-492D-A248-80D6C5DD0B50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netcommwireless:nf20mesh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r6b025\",\"matchCriteriaId\":\"492B3CE0-A18A-4D6E-A20F-5CD00D8FC234\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netcommwireless:nf20mesh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79CF62CC-4353-4090-8D85-5F8126A029EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netcommwireless:nl1902_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r6b025\",\"matchCriteriaId\":\"131C4DCD-D115-40AE-A53D-2C3B4799CBD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netcommwireless:nl1902:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02578F1-96D9-4A0C-A27E-F08518A7CA55\"}]}]}],\"references\":[{\"url\":\"https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:55:46.021Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-4874\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-09T14:13:36.023102Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-09T14:14:09.111Z\"}}], \"cna\": {\"title\": \"Authenticated bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows unauthenticated user to get access to content.\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"affected\": [{\"vendor\": \"Netcomm\", \"product\": \"NF20\", \"versions\": [{\"status\": \"affected\", \"version\": \"R6B025\"}]}, {\"vendor\": \"Netcomm\", \"product\": \"NF20MESH\", \"versions\": [{\"status\": \"affected\", \"version\": \"R6B025\"}]}, {\"vendor\": \"Netcomm\", \"product\": \"NL1902\", \"versions\": [{\"status\": \"affected\", \"version\": \"R6B025\"}]}], \"references\": [{\"url\": \"https://github.com/scarvell/advisories/blob/main/2022_netcomm_nf20mesh_unauth_rce.md\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 2.0.5\", \"origin\": \"https://cveawg.mitre.org/api//cve/CVE-2022-4874\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the existence of specific characters in the URL (.css, .png etc). If it exists, it performs a \\\"fake login\\\" to give the request an active session to load the file and not redirect to the login page.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-288\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2023-01-11T20:39:25.219Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-4874\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-09T14:14:13.898Z\", \"dateReserved\": \"2023-01-04T14:23:54.409Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2023-01-11T20:39:25.219Z\", \"assignerShortName\": \"certcc\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…