CVE-2022-27438 (GCVE-0-2022-27438)
Vulnerability from cvelistv5
Published
2022-06-06 22:21
Modified
2024-08-03 05:25
Severity ?
CWE
  • n/a
Summary
Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:25:32.729Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://advanced.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://caphyon.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gerr.re/posts/cve-2022-27438/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-14T15:51:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://advanced.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://caphyon.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gerr.re/posts/cve-2022-27438/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-27438",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://advanced.com",
              "refsource": "MISC",
              "url": "http://advanced.com"
            },
            {
              "name": "http://caphyon.com",
              "refsource": "MISC",
              "url": "http://caphyon.com"
            },
            {
              "name": "https://gerr.re/posts/cve-2022-27438/",
              "refsource": "MISC",
              "url": "https://gerr.re/posts/cve-2022-27438/"
            },
            {
              "name": "https://www.advancedinstaller.com/security-updates-auto-updater.html",
              "refsource": "MISC",
              "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-27438",
    "datePublished": "2022-06-06T22:21:30",
    "dateReserved": "2022-03-21T00:00:00",
    "dateUpdated": "2024-08-03T05:25:32.729Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-27438\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-06-06T23:15:07.920\",\"lastModified\":\"2024-11-21T06:55:44.173\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.\"},{\"lang\":\"es\",\"value\":\"Caphyon Ltd Advanced Installer 19.3 y anteriores y muchos productos que utilizan el actualizador de Advanced Installer (Advanced Updater) est\u00e1n afectados por una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del par\u00e1metro CustomDetection en la funci\u00f3n de comprobaci\u00f3n de actualizaciones. Para explotar esta vulnerabilidad, un usuario debe iniciar una instalaci\u00f3n afectada para activar la comprobaci\u00f3n de la actualizaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-494\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:caphyon:advanced_installer:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.4\",\"matchCriteriaId\":\"5CD95070-6141-49F0-9DF3-B2BA038D4D2E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:3cx:call_flow_designer:18.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7654BEC0-A193-4496-B845-CA0B2DAC3B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:3cx:crm_template_generator:2.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A873E57-23AB-466A-8168-BD9BD4D7EA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boom:boomtv_streamer_portal:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11887C03-5D42-4203-96D5-35F18231ED81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesector:direct_folders:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87AF4CE6-47AC-4446-8853-F9A9DBD58865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesector:teracopy:3.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"481C2BFB-3424-4C74-84DE-37E325EAD736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emeditor:emeditor:21.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B63192-D3E0-43C6-BA15-DBC1792A45D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:flamory:flamory:4.2.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3146285D-4191-4D8F-8E1D-76450D1B238F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freesnippingtool:free_snipping_tool:5.6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10A15BE3-5FE4-4864-A7D9-7D53CA090C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fxsound:fxsound:1.1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3A801B-3149-48B4-A366-3D7CD750FBF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gainedge:better_explorer:2020.3.15.1304:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0531E74E-84BB-43E9-BDF9-16CEB36982A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gamecaster:gamecaster:4.0.2109.2802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06B30FD-F588-479D-B3AD-80485171A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getmailbird:mailbird:2.9.50.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F766EF-9716-4728-9066-081BA64FA477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:guzogo:guzogo:1.0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C095A60A-5348-4EFF-8F2D-132A6C20C70B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:honeygain:honeygain:0.10.7.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"9269C619-0F6F-4553-924D-657A773B4167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jki:vi_package_manager:21.1.2754:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A22A8AC-A3CE-49AD-8013-80A9146E3C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jpsoft:take_command:28.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6C42BA-0285-48CA-BFDE-7E74986B0475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:archive_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE00A0F0-D51A-4315-8DE5-D93704460040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:asterisks_password_decryptor:3.31.107:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2989B6AE-400B-494C-B139-834FD8740E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:burning_suite:1.20.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34031D0-8C17-4ACF-83BE-CE3CB57B1AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:rar_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D561711E-F1AB-442C-A845-6DA783B33730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:volume_serial_number_editor:2.02.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2A2C186-E1EB-4370-9F4A-1CBAB5AD541A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:zip_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B4DAE9-D008-4E98-8AE2-6A5B5B71AAC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moonsoftware:password_agent:20.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"555BE493-5C7D-4AFB-BE0D-CDA400160B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nefarius:scptoolkit:1.6.238.16010:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050AA00C-8EE9-4862-AF76-9F25ADA565FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plagiarismcheckerx:plagiarism_checker_x:8.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E15E9E-A340-43D8-830E-8F5538B55D70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:prusa3d:prusaslicer:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF2822E-6C55-4E28-BDCB-B0915C1663BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mycleanid:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A602BAC5-DCD5-4732-9645-72AC8571D39E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mycleanpc:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5E254C-AF36-4489-9FD9-BE73DA7B812F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mypasslock:1.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3D4E66-25C4-4269-980B-EB60D4BD34CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rovio:angry_birds_space:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8ADCDAA-BE19-4637-8D6A-1F61605A78C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rovio:bad_piggies:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5729781C-5957-4F08-A8D5-FD0999AB56A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synaptics:displaylink_usb_graphics:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"10.3.6400.0\",\"matchCriteriaId\":\"53E39B75-F9DD-4609-BD37-0B542A131EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:urban-vpn:urban_vpn:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679DCBAE-46C5-473D-A904-2D5ADFB8758F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vigem:vigembus_driver:1.16.116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751DA7D2-48CF-495E-A4C2-257D6EE55A7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vpnhood:vpnhood:2.4.299:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"CD05193F-055E-4873-8E8C-7F06ABB1866B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vrdesktop:virtual_desktop_streamer:1.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"135F7469-5512-4AA8-88DC-29F2B9EC83B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xsplit:xsplit_express_video_editor:3.0.2001.801:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AA9E71-CCD5-4704-A48B-52A831C190D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:vw0420_firmware:1.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F2B7CD-4BB2-4E26-97FE-0BFCBD0BA8CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:vw0420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F34AF28-A3F5-4AEA-A272-9561FA3AC1CF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rstinstruments:inclinalysis_digital_inclinometer:2.48.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E3980D-BD39-4AA9-9104-EE09613603D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rstinstruments:ipi_utility:1.05.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A1FD21-BDDB-4124-AF89-9856119BCFA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:rstar_rtu_host:1.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B42174F-BAB9-4B6E-B9DC-79E1E5B5D959\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2011_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EEA6AD-CABE-4CEE-8DB8-853C3EB7448A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2011:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1EAE7AC-F74E-4902-9F61-71CAB183F95E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2011b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0EE19C-A372-4C78-9E72-5F2DDDA99174\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2011b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3339FD4E-A230-41A4-BD22-796B9DAB2441\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2040_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA87C91C-ECC2-4A43-9E31-FD0B2AF7E8B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3667DAF9-78AE-4A3E-909D-BBA87746C064\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2050_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEFAD24-80F7-4B97-A923-D0D3FB805802\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B01F16-A33E-4288-9132-8AB91D107E0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2050b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F96B57E-090C-434E-83A4-71E127D563F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2050b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC92D0A1-93B3-4D06-9773-60CB9692A11E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2055b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6E888A-2B15-46B6-A0F4-7B2BB9C02490\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2055b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66512112-CA68-4914-A6AD-28C7C3D5E5E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2306_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887B5A1C-AE21-47C2-ACB5-D0D7DE1BF209\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2306:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AC0E88-CEB8-4D09-8681-B635414BD13D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2350_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F88445-B2FE-45F4-9BC0-43BB5EED30FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E385F6D9-498E-450A-98AB-12D213EBC741\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2485_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CE4AA8A-D27F-439B-B13E-85BC966DCB6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2485:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3F51E6-06FF-471A-9FD6-F13F263B9343\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt4205_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E202C2ED-B24B-4D65-B68D-1AB4E7D70B32\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt4205:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A9155E-EDD5-42B3-ADA8-C6566D18DD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dtsaa_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E3B8EC-2ED2-4BC4-9E17-BB98DD2CEF5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dtsaa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451A545-530A-4812-9981-34CEF6110608\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ic6560_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFBB43A3-E06E-4FED-83A8-CF02D9A97131\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ic6560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE451B36-C867-43F8-AF37-DBD2D5916DA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ic6660_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"748B8996-F43B-4A75-A361-2038B15A26AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ic6660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D58B98B-2929-4979-9BCE-503E908CEFA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dtl201b\\\\/2b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9001EC91-14AA-41D1-820A-CA49CF247303\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dtl201b\\\\/2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C674D6C7-5DDF-40E8-BBC8-DDF872FE853B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:mtcm_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAA78A2-00CE-42E0-BBD4-BB3C174325F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:mtcm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78D1CFA-DB46-444B-9193-839CD62EE796\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:gaa2820_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C54859-67B3-482C-9C11-92C4334C0696\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:gaa2820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E123B97-89D6-4C51-B76F-55B3AA0D19E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:rtu_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9850BE4-1243-453B-943A-161F290AC28B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:rtu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BBB33B-1133-4CAF-83DB-81E23620F613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:mems_tilt_meter_firmware:1.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1468DB04-9851-4D48-B642-F06ADC4CEF0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:mems_tilt_meter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28167223-C3FE-4506-A820-511DC8772823\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:portable_tilt_meter_firmware:1.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9697D8-AD61-426F-940A-0AC554607ED1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:portable_tilt_meter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB4AB63-9B50-4D05-B999-95298EDC3799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:vw2106_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141994E-06E4-4F61-889E-7132EC70CF91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:vw2106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC3F050-4086-4049-B042-40714AE4B6F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:th2016_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFA437F-830C-43CF-8713-71CD021DB308\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:th2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A688FA-82A7-4427-9DAC-53DD754F93CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:th2016b_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2AC142-76B2-4D79-9D74-0E2157D215E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:th2016b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686DC243-CEE0-4A05-BD08-2026DE0F7A03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ma7_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E7345B-9442-46A8-9B9C-22BE88975C17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ma7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9856063D-92A6-4500-8580-1C06C51DB47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:qb120_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3F7A0C-5120-41C0-8FD3-6BD701054919\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:qb120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"400DBC5A-79FA-4BB2-98D8-D86B0624A05E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:sg350_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BB3B34-C49F-47C3-AFB6-FC0B3DC03566\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:sg350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A10D4B-759D-4930-8C09-0E002210265E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ir420_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E118A74-6319-419A-970C-B2B16AB80312\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ir420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225A4FE3-1FCB-44F0-9DD3-0A8D3869A8D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:lp100_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F0AADF-053C-4E4F-98C0-D1512276D6ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:lp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76513FD5-8131-4CEE-B266-243CF39A3E87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:c109_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"372BFCE3-D88E-4606-B8D9-A2A052CC4B04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:c109:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C44A88-9785-49C0-85A3-EC8BCCB5DAA3\"}]}]}],\"references\":[{\"url\":\"http://advanced.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"http://caphyon.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://gerr.re/posts/cve-2022-27438/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.advancedinstaller.com/security-updates-auto-updater.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://advanced.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"http://caphyon.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://gerr.re/posts/cve-2022-27438/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.advancedinstaller.com/security-updates-auto-updater.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…