{"vulnerability": "CVE-2022-46144", "sightings": [{"uuid": "2db0453e-45cf-4b12-b85c-53fd1435e3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46144", "type": "seen", "source": "https://t.me/cibsecurity/54407", "content": "\u203c CVE-2022-46144 \u203c\n\nA vulnerability has been identified in SCALANCE SC622-2C (All versions &lt; V2.3), SCALANCE SC622-2C (All versions &gt;= 2.3 &lt; V3.0), SCALANCE SC626-2C (All versions &lt; V2.3), SCALANCE SC626-2C (All versions &gt;= 2.3 &lt; V3.0), SCALANCE SC632-2C (All versions &lt; V2.3), SCALANCE SC632-2C (All versions &gt;= 2.3 &lt; V3.0), SCALANCE SC636-2C (All versions &lt; V2.3), SCALANCE SC636-2C (All versions &gt;= 2.3 &lt; V3.0), SCALANCE SC642-2C (All versions &lt; V2.3), SCALANCE SC642-2C (All versions &gt;= 2.3 &lt; V3.0), SCALANCE SC646-2C (All versions &lt; V2.3), SCALANCE SC646-2C (All versions &gt;= 2.3 &lt; V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-13T18:21:52.000000Z"}]}