All the vulnerabilites related to ChangingTec - MegaServiSignAdapter
cve-2022-39059
Vulnerability from cvelistv5
Published
2023-01-31 00:00
Modified
2024-08-03 11:10
Severity ?
EPSS score ?
Summary
ChangingTech MegaServiSignAdapter component has a path traversal vulnerability within its file reading function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ChangingTec | MegaServiSignAdapter |
Version: 1.0.17.0823 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-6886-2c546-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "MegaServiSignAdapter", "vendor": "ChangingTec", "versions": [ { "status": "affected", "version": "1.0.17.0823" } ] } ], "credits": [ { "lang": "en", "value": "DEVCORE" } ], "datePublic": "2023-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ChangingTech MegaServiSignAdapter component has a path traversal vulnerability within its file reading function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-6886-2c546-1.html" } ], "solutions": [ { "lang": "en", "value": "Update MegaServiSignAdapter (Windows) version to 1.0.22.1004" } ], "source": { "advisory": "TVN-202212008", "discovery": "EXTERNAL" }, "title": "ChangingTec MegaServiSignAdapter - Path Traversal", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2022-39059", "datePublished": "2023-01-31T00:00:00", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-08-03T11:10:32.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39060
Vulnerability from cvelistv5
Published
2023-01-31 00:00
Modified
2024-08-03 11:10
Severity ?
EPSS score ?
Summary
ChangingTech MegaServiSignAdapter component has a vulnerability of improper input validation. An unauthenticated remote attacker can exploit this vulnerability to access and modify HKEY_CURRENT_USER subkey (ex: AutoRUN) in Registry where malicious scripts can be executed to take control of the system or to terminate the service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ChangingTec | MegaServiSignAdapter |
Version: 1.0.17.0823 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-6887-6ed4f-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "MegaServiSignAdapter", "vendor": "ChangingTec", "versions": [ { "status": "affected", "version": "1.0.17.0823" } ] } ], "credits": [ { "lang": "en", "value": "DEVCORE" } ], "datePublic": "2023-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ChangingTech MegaServiSignAdapter component has a vulnerability of improper input validation. An unauthenticated remote attacker can exploit this vulnerability to access and modify HKEY_CURRENT_USER subkey (ex: AutoRUN) in Registry where malicious scripts can be executed to take control of the system or to terminate the service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-6887-6ed4f-1.html" } ], "solutions": [ { "lang": "en", "value": "Update MegaServiSignAdapter (Windows) version to 1.0.22.1004" } ], "source": { "advisory": "TVN-202212009", "discovery": "EXTERNAL" }, "title": "ChangingTec MegaServiSignAdapter - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2022-39060", "datePublished": "2023-01-31T00:00:00", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-08-03T11:10:32.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39061
Vulnerability from cvelistv5
Published
2023-01-31 00:00
Modified
2024-08-03 11:10
Severity ?
EPSS score ?
Summary
ChangingTech MegaServiSignAdapter component has a vulnerability of Out-of-bounds Read due to insufficient validation for parameter length. An unauthenticated remote attacker can exploit this vulnerability to access partial sensitive content in memory and disrupts partial services.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ChangingTec | MegaServiSignAdapter |
Version: 1.0.17.0823 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-6888-b5f81-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "MegaServiSignAdapter", "vendor": "ChangingTec", "versions": [ { "status": "affected", "version": "1.0.17.0823" } ] } ], "credits": [ { "lang": "en", "value": "DEVCORE" } ], "datePublic": "2023-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ChangingTech MegaServiSignAdapter component has a vulnerability of Out-of-bounds Read due to insufficient validation for parameter length. An unauthenticated remote attacker can exploit this vulnerability to access partial sensitive content in memory and disrupts partial services." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-6888-b5f81-1.html" } ], "solutions": [ { "lang": "en", "value": "Update MegaServiSignAdapter (Windows) version to 1.0.22.1004" } ], "source": { "advisory": "TVN-202212010", "discovery": "EXTERNAL" }, "title": "ChangingTec MegaServiSignAdapter - Out-of-bounds Read", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2022-39061", "datePublished": "2023-01-31T00:00:00", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-08-03T11:10:32.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }