{"vulnerability": "CVE-2022-4492", "sightings": [{"uuid": "75494aa6-0a23-48eb-b74e-9a6253d3f4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44929", "type": "seen", "source": "https://t.me/cibsecurity/53792", "content": "\u203c CVE-2022-44929 \u203c\n\nAn access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated attackers to escalate privileges via arbitrarily editing VoIP SIB profiles.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T07:50:35.000000Z"}, {"uuid": "45628cfe-b0ab-40dd-8638-ef4962d18974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4492", "type": "seen", "source": "https://t.me/arpsyndicate/3127", "content": "#ExploitObserverAlert\n\nCVE-2022-4492\n\nDESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2022-4492. The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.\n\nFIRST-EPSS: 0.000570000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T00:17:46.000000Z"}, {"uuid": "e57fe2c4-8704-437f-b17e-2b7feacf49fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4492", "type": "seen", "source": "https://t.me/cibsecurity/58820", "content": "\u203c CVE-2022-4492 \u203c\n\nThe undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-23T22:18:46.000000Z"}, {"uuid": "4f80b286-00b2-4fee-8506-87bbdebc1800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4492", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4492\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.\n\ud83d\udccf Published: 2023-02-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-12T14:34:50.123Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2153260\n2. https://access.redhat.com/security/cve/CVE-2022-4492\n3. https://security.netapp.com/advisory/ntap-20230324-0002/", "creation_timestamp": "2025-03-12T14:40:33.000000Z"}, {"uuid": "adee572e-22a3-4b2c-861d-3b339d868043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44928", "type": "seen", "source": "https://t.me/cibsecurity/53790", "content": "\u203c CVE-2022-44928 \u203c\n\nD-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T07:50:33.000000Z"}]}