{"vulnerability": "CVE-2022-3630", "sightings": [{"uuid": "6bb92f18-6ee5-40f0-b98f-00c4530e9a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36301", "type": "seen", "source": "https://t.me/cibsecurity/47342", "content": "\u203c CVE-2022-36301 \u203c\n\nBF-OS version 3.x up to and including 3.83 do not enforce strong passwords which may allow a remote attacker to brute-force the device password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:17:07.000000Z"}, {"uuid": "62a478a0-f82d-4a22-9dfd-dd35f8f9ebed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36308", "type": "seen", "source": "https://t.me/cibsecurity/48202", "content": "\u203c CVE-2022-36308 \u203c\n\nAirspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T07:38:41.000000Z"}, {"uuid": "f5af89b0-1c40-4f92-a930-ff418abfabd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36307", "type": "seen", "source": "https://t.me/cibsecurity/48200", "content": "\u203c CVE-2022-36307 \u203c\n\nThe AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T07:38:39.000000Z"}, {"uuid": "9aa800c9-070f-46f6-8b89-5100691ba710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36306", "type": "seen", "source": "https://t.me/cibsecurity/48199", "content": "\u203c CVE-2022-36306 \u203c\n\nAn authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T07:38:38.000000Z"}, {"uuid": "bca56f3d-df52-4eeb-9361-a84a2904c6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36309", "type": "seen", "source": "https://t.me/cibsecurity/48206", "content": "\u203c CVE-2022-36309 \u203c\n\nAirspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T07:46:45.000000Z"}, {"uuid": "90b35037-e46a-43ba-8584-7ff44ae6212d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36304", "type": "seen", "source": "https://t.me/cibsecurity/46579", "content": "\u203c CVE-2022-36304 \u203c\n\nVesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the generate_response function at /web/api/v1/upload/UploadHandler.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T22:40:55.000000Z"}, {"uuid": "bd9fd6d1-bb14-496c-9bb0-2ecdb89e9a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36303", "type": "seen", "source": "https://t.me/cibsecurity/46581", "content": "\u203c CVE-2022-36303 \u203c\n\nVesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the handle_file_upload function at /web/api/v1/upload/UploadHandler.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T22:40:59.000000Z"}]}