{"vulnerability": "CVE-2022-22948", "sightings": [{"uuid": "a45b6947-c2bd-4b3a-9997-aeadad215913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-07-17T18:10:03.000000Z"}, {"uuid": "472f946f-2efa-4a96-9f5f-e4fa064ac499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}, {"uuid": "5f88b3a0-a67c-4fec-9868-37df2b231dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "1e0f40d7-04a1-470b-a23d-e5567705367a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:56.000000Z"}, {"uuid": "e93732cd-a3cf-43e2-85ee-fe0f535bc691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:32.000000Z"}, {"uuid": "5ceab656-8817-43cc-afee-752edfa92bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/post/linux/gather/vcenter_secrets_dump.rb", "content": "", "creation_timestamp": "2022-11-02T11:13:25.000000Z"}, {"uuid": "c430deed-730e-4ad9-9df9-74bfb4904832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-22948", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bc0d12b9-dcac-429d-b23d-8261d773156e", "content": "", "creation_timestamp": "2026-02-02T12:26:33.233512Z"}, {"uuid": "d214f519-1e2d-4a90-9e18-4712d7fcba54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1738", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aScanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter\nURL\uff1ahttps://github.com/PenteraIO/CVE-2022-22948\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-03-29T16:53:05.000000Z"}, {"uuid": "8dd44a4e-df56-4ac9-9ce9-2109d270e042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "published-proof-of-concept", "source": "https://t.me/cKure/9210", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Zero-Day: CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter.\n\nhttps://www.pentera.io/blog/information-disclosure-in-vmware-vcenter/", "creation_timestamp": "2022-03-30T04:44:10.000000Z"}, {"uuid": "7f5e61d6-0b6e-48f2-bc20-6e7a317409df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2090", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aResolving the CVE-2022-22948 vulnerability\nURL\uff1ahttps://github.com/kaanymz/researching-cve-2022-22948-vcenter\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-03T15:29:01.000000Z"}, {"uuid": "d124a97b-80d8-45f0-b41e-ff1ffa65806a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/poxek/1234", "content": "CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter\n\u25b6\ufe0f \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-04-05T12:57:16.000000Z"}, {"uuid": "6a2d5935-871d-4001-ae94-76212cc848c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2072", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aResolving the CVE-2022-22948 vulnerability\nURL\uff1ahttps://github.com/kaanymz/vcenter-cve-fix\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-01T11:55:04.000000Z"}, {"uuid": "ef1a4bf2-ecda-425f-9d89-db28d15d1472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "Telegram/fM8hdjxLz40JGYPGE9ZFMBr-RWT0zMxxwLIwpRZXCCCJO7DN", "content": "", "creation_timestamp": "2025-02-14T10:00:29.000000Z"}, {"uuid": "bc2ee7dd-d400-4270-b1b5-1b7e0919f7a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/CyberBulletin/110", "content": "\u26a1Cisco patches critical #vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins.\n\nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now!", "creation_timestamp": "2024-07-18T15:42:23.000000Z"}, {"uuid": "73df1864-a346-4fa7-aa7d-4cb952eeb632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "published-proof-of-concept", "source": "https://t.me/ARC15INFO/295", "content": "CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter.\n\nNew zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Organizations should evaluate risk and apply vCenter client patches immediately.\n\n\ud83c\udf00 Executive Summary\n\nPentera Labs\u2019 Senior Security Researcher, Yuval Lazar, discovered an Information Disclosure vulnerability impacting more than 500,000 appliances running default vCenter Server deployments.\n\nThis finding is critical given its potential global impact. According to VMware \u2013 more than 80 percent of virtualized workloads are running on VMware technology, including 100 percent of Fortune 500 and Fortune Global 100 companies.\n\nhttps://www.pentera.io/blog/information-disclosure-in-vmware-vcenter/\n\n\ud83d\udce1@cRyPtHoN_INFOSEC_FR\n\ud83d\udce1@cRyPtHoN_INFOSEC_EN\n\ud83d\udce1@cRyPtHoN_INFOSEC_DE\n\ud83d\udce1@BlackBox_Archiv", "creation_timestamp": "2024-08-29T06:23:17.000000Z"}, {"uuid": "a428246a-1de7-4ab0-a885-664cdc529ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/GrayHatsHack/6967", "content": "\u26a1Cisco patches critical #vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins.\n\nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now!", "creation_timestamp": "2024-07-18T16:04:12.000000Z"}, {"uuid": "03a09cab-17d1-4e5f-a967-f7e5de0bdfc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/dilagrafie/3442", "content": "\u26a1Cisco patches critical #vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins.\n\nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now!", "creation_timestamp": "2024-07-18T15:42:49.000000Z"}, {"uuid": "18fc2f88-f8cc-4d25-91ce-5b165ffe223a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/GrayHatsHack/8266", "content": "\u26a1Cisco patches critical #vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins.\n\nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now!", "creation_timestamp": "2024-07-18T16:04:12.000000Z"}, {"uuid": "fe6c3d72-bdce-4047-856e-200a0b55b4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/cibsecurity/39771", "content": "\u203c CVE-2022-22948 \u203c\n\nThe vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T22:11:27.000000Z"}, {"uuid": "4d067317-c870-400a-a5fd-e6ac4dab497b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "exploited", "source": "https://t.me/thehackernews/5269", "content": "\ud83d\udea8 ALERT: Cisco patches critical vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins. \n \nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now! \n \nRead: https://thehackernews.com/2024/07/cisco-warns-of-critical-flaw-affecting.html", "creation_timestamp": "2024-07-18T08:04:42.000000Z"}, {"uuid": "138428ba-f782-4cba-9aad-6bab0e26c0b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/GhostClanInt/25310", "content": "\u26a1Cisco patches critical #vulnerability in Smart Software Manager On-Prem. This flaw could allow attackers to change any user's password, including admins.\n\nCVE-2022-22948 could be exploited with crafted HTTP requests\u2014Patch now!", "creation_timestamp": "2024-07-18T16:16:33.000000Z"}, {"uuid": "4468626a-2eac-428d-b99b-122b4521a89a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22948", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5742", "content": "#exploit\nCVE-2022-22948:\nSensitive Information Disclosure in VMware vCenter\nhttps://www.pentera.io/blog/information-disclosure-in-vmware-vcenter", "creation_timestamp": "2022-04-04T13:21:21.000000Z"}]}