{"vulnerability": "CVE-2022-46732", "sightings": [{"uuid": "24530e15-1f33-4e7e-a7a4-39a68dcefc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46732", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2238", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46732\n\ud83d\udd39 Description: Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status.\n\ud83d\udccf Published: 2023-01-17T23:31:14.972Z\n\ud83d\udccf Modified: 2025-01-17T22:13:06.336Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01\n2. https://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01", "creation_timestamp": "2025-01-17T22:57:02.000000Z"}, {"uuid": "9dab8c56-e410-4758-9ed0-3d18ee01be60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46732", "type": "published-proof-of-concept", "source": "Telegram/H5Dkkha3Th8jseqkeGc7uOUCt_0lfInetyOoX5ljpqSECpk", "content": "", "creation_timestamp": "2023-03-15T13:15:26.000000Z"}, {"uuid": "a2b41d76-b6ad-493a-a3aa-f7f47c8ed9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46732", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7928", "content": "#SCADA_Security\nHacking ICS Historians:\nThe Pivot Point from IT to OT  (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, CVE-2022-38469)\nhttps://claroty.com/team82/research/hacking-ics-historians-the-pivot-point-from-it-to-ot", "creation_timestamp": "2023-03-15T11:02:01.000000Z"}]}