CVE-2022-27438 (GCVE-0-2022-27438)
Vulnerability from cvelistv5
Published
2022-06-06 22:21
Modified
2024-08-03 05:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://advanced.com | Product | |
cve@mitre.org | http://caphyon.com | Product | |
cve@mitre.org | https://gerr.re/posts/cve-2022-27438/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.advancedinstaller.com/security-updates-auto-updater.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://advanced.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | http://caphyon.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://gerr.re/posts/cve-2022-27438/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.advancedinstaller.com/security-updates-auto-updater.html | Patch, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:32.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://advanced.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://caphyon.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerr.re/posts/cve-2022-27438/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-14T15:51:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://advanced.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://caphyon.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerr.re/posts/cve-2022-27438/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-27438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://advanced.com", "refsource": "MISC", "url": "http://advanced.com" }, { "name": "http://caphyon.com", "refsource": "MISC", "url": "http://caphyon.com" }, { "name": "https://gerr.re/posts/cve-2022-27438/", "refsource": "MISC", "url": "https://gerr.re/posts/cve-2022-27438/" }, { "name": "https://www.advancedinstaller.com/security-updates-auto-updater.html", "refsource": "MISC", "url": "https://www.advancedinstaller.com/security-updates-auto-updater.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-27438", "datePublished": "2022-06-06T22:21:30", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:25:32.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-27438\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-06-06T23:15:07.920\",\"lastModified\":\"2024-11-21T06:55:44.173\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.\"},{\"lang\":\"es\",\"value\":\"Caphyon Ltd Advanced Installer 19.3 y anteriores y muchos productos que utilizan el actualizador de Advanced Installer (Advanced Updater) est\u00e1n afectados por una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del par\u00e1metro CustomDetection en la funci\u00f3n de comprobaci\u00f3n de actualizaciones. Para explotar esta vulnerabilidad, un usuario debe iniciar una instalaci\u00f3n afectada para activar la comprobaci\u00f3n de la actualizaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-494\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:caphyon:advanced_installer:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.4\",\"matchCriteriaId\":\"5CD95070-6141-49F0-9DF3-B2BA038D4D2E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:3cx:call_flow_designer:18.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7654BEC0-A193-4496-B845-CA0B2DAC3B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:3cx:crm_template_generator:2.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A873E57-23AB-466A-8168-BD9BD4D7EA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:boom:boomtv_streamer_portal:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11887C03-5D42-4203-96D5-35F18231ED81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesector:direct_folders:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87AF4CE6-47AC-4446-8853-F9A9DBD58865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesector:teracopy:3.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"481C2BFB-3424-4C74-84DE-37E325EAD736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:emeditor:emeditor:21.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B63192-D3E0-43C6-BA15-DBC1792A45D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:flamory:flamory:4.2.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3146285D-4191-4D8F-8E1D-76450D1B238F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freesnippingtool:free_snipping_tool:5.6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10A15BE3-5FE4-4864-A7D9-7D53CA090C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fxsound:fxsound:1.1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3A801B-3149-48B4-A366-3D7CD750FBF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gainedge:better_explorer:2020.3.15.1304:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0531E74E-84BB-43E9-BDF9-16CEB36982A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gamecaster:gamecaster:4.0.2109.2802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06B30FD-F588-479D-B3AD-80485171A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getmailbird:mailbird:2.9.50.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F766EF-9716-4728-9066-081BA64FA477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:guzogo:guzogo:1.0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C095A60A-5348-4EFF-8F2D-132A6C20C70B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:honeygain:honeygain:0.10.7.0:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"9269C619-0F6F-4553-924D-657A773B4167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jki:vi_package_manager:21.1.2754:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A22A8AC-A3CE-49AD-8013-80A9146E3C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jpsoft:take_command:28.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6C42BA-0285-48CA-BFDE-7E74986B0475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:archive_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE00A0F0-D51A-4315-8DE5-D93704460040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:asterisks_password_decryptor:3.31.107:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2989B6AE-400B-494C-B139-834FD8740E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:burning_suite:1.20.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34031D0-8C17-4ACF-83BE-CE3CB57B1AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:rar_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D561711E-F1AB-442C-A845-6DA783B33730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:volume_serial_number_editor:2.02.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2A2C186-E1EB-4370-9F4A-1CBAB5AD541A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:krylack:zip_password_recovery:3.70.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B4DAE9-D008-4E98-8AE2-6A5B5B71AAC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moonsoftware:password_agent:20.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"555BE493-5C7D-4AFB-BE0D-CDA400160B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nefarius:scptoolkit:1.6.238.16010:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050AA00C-8EE9-4862-AF76-9F25ADA565FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:plagiarismcheckerx:plagiarism_checker_x:8.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E15E9E-A340-43D8-830E-8F5538B55D70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:prusa3d:prusaslicer:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF2822E-6C55-4E28-BDCB-B0915C1663BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mycleanid:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A602BAC5-DCD5-4732-9645-72AC8571D39E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mycleanpc:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5E254C-AF36-4489-9FD9-BE73DA7B812F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:realdefense:mypasslock:1.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3D4E66-25C4-4269-980B-EB60D4BD34CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rovio:angry_birds_space:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8ADCDAA-BE19-4637-8D6A-1F61605A78C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rovio:bad_piggies:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5729781C-5957-4F08-A8D5-FD0999AB56A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synaptics:displaylink_usb_graphics:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"10.3.6400.0\",\"matchCriteriaId\":\"53E39B75-F9DD-4609-BD37-0B542A131EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:urban-vpn:urban_vpn:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679DCBAE-46C5-473D-A904-2D5ADFB8758F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vigem:vigembus_driver:1.16.116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751DA7D2-48CF-495E-A4C2-257D6EE55A7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vpnhood:vpnhood:2.4.299:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"CD05193F-055E-4873-8E8C-7F06ABB1866B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vrdesktop:virtual_desktop_streamer:1.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"135F7469-5512-4AA8-88DC-29F2B9EC83B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xsplit:xsplit_express_video_editor:3.0.2001.801:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AA9E71-CCD5-4704-A48B-52A831C190D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:vw0420_firmware:1.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F2B7CD-4BB2-4E26-97FE-0BFCBD0BA8CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:vw0420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F34AF28-A3F5-4AEA-A272-9561FA3AC1CF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rstinstruments:inclinalysis_digital_inclinometer:2.48.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E3980D-BD39-4AA9-9104-EE09613603D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rstinstruments:ipi_utility:1.05.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A1FD21-BDDB-4124-AF89-9856119BCFA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:rstar_rtu_host:1.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B42174F-BAB9-4B6E-B9DC-79E1E5B5D959\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2011_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EEA6AD-CABE-4CEE-8DB8-853C3EB7448A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2011:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1EAE7AC-F74E-4902-9F61-71CAB183F95E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2011b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0EE19C-A372-4C78-9E72-5F2DDDA99174\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2011b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3339FD4E-A230-41A4-BD22-796B9DAB2441\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2040_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA87C91C-ECC2-4A43-9E31-FD0B2AF7E8B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3667DAF9-78AE-4A3E-909D-BBA87746C064\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2050_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEFAD24-80F7-4B97-A923-D0D3FB805802\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B01F16-A33E-4288-9132-8AB91D107E0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2050b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F96B57E-090C-434E-83A4-71E127D563F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2050b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC92D0A1-93B3-4D06-9773-60CB9692A11E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2055b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6E888A-2B15-46B6-A0F4-7B2BB9C02490\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2055b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66512112-CA68-4914-A6AD-28C7C3D5E5E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2306_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887B5A1C-AE21-47C2-ACB5-D0D7DE1BF209\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2306:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AC0E88-CEB8-4D09-8681-B635414BD13D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2350_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F88445-B2FE-45F4-9BC0-43BB5EED30FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E385F6D9-498E-450A-98AB-12D213EBC741\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt2485_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CE4AA8A-D27F-439B-B13E-85BC966DCB6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt2485:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3F51E6-06FF-471A-9FD6-F13F263B9343\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dt4205_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E202C2ED-B24B-4D65-B68D-1AB4E7D70B32\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dt4205:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A9155E-EDD5-42B3-ADA8-C6566D18DD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dtsaa_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E3B8EC-2ED2-4BC4-9E17-BB98DD2CEF5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dtsaa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451A545-530A-4812-9981-34CEF6110608\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ic6560_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFBB43A3-E06E-4FED-83A8-CF02D9A97131\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ic6560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE451B36-C867-43F8-AF37-DBD2D5916DA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ic6660_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"748B8996-F43B-4A75-A361-2038B15A26AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ic6660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D58B98B-2929-4979-9BCE-503E908CEFA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:dtl201b\\\\/2b_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9001EC91-14AA-41D1-820A-CA49CF247303\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:dtl201b\\\\/2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C674D6C7-5DDF-40E8-BBC8-DDF872FE853B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:mtcm_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAA78A2-00CE-42E0-BBD4-BB3C174325F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:mtcm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78D1CFA-DB46-444B-9193-839CD62EE796\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:gaa2820_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C54859-67B3-482C-9C11-92C4334C0696\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:gaa2820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E123B97-89D6-4C51-B76F-55B3AA0D19E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:rtu_firmware:1.19.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9850BE4-1243-453B-943A-161F290AC28B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:rtu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BBB33B-1133-4CAF-83DB-81E23620F613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:mems_tilt_meter_firmware:1.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1468DB04-9851-4D48-B642-F06ADC4CEF0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:mems_tilt_meter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28167223-C3FE-4506-A820-511DC8772823\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:portable_tilt_meter_firmware:1.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9697D8-AD61-426F-940A-0AC554607ED1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:portable_tilt_meter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB4AB63-9B50-4D05-B999-95298EDC3799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:vw2106_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141994E-06E4-4F61-889E-7132EC70CF91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:vw2106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC3F050-4086-4049-B042-40714AE4B6F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:th2016_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFA437F-830C-43CF-8713-71CD021DB308\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:th2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A688FA-82A7-4427-9DAC-53DD754F93CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:th2016b_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2AC142-76B2-4D79-9D74-0E2157D215E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:th2016b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686DC243-CEE0-4A05-BD08-2026DE0F7A03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ma7_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E7345B-9442-46A8-9B9C-22BE88975C17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ma7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9856063D-92A6-4500-8580-1C06C51DB47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:qb120_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3F7A0C-5120-41C0-8FD3-6BD701054919\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:qb120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"400DBC5A-79FA-4BB2-98D8-D86B0624A05E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:sg350_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BB3B34-C49F-47C3-AFB6-FC0B3DC03566\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:sg350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A10D4B-759D-4930-8C09-0E002210265E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:ir420_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E118A74-6319-419A-970C-B2B16AB80312\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:ir420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225A4FE3-1FCB-44F0-9DD3-0A8D3869A8D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:lp100_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F0AADF-053C-4E4F-98C0-D1512276D6ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:lp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76513FD5-8131-4CEE-B266-243CF39A3E87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rstinstruments:c109_firmware:1.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"372BFCE3-D88E-4606-B8D9-A2A052CC4B04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rstinstruments:c109:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C44A88-9785-49C0-85A3-EC8BCCB5DAA3\"}]}]}],\"references\":[{\"url\":\"http://advanced.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"http://caphyon.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://gerr.re/posts/cve-2022-27438/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.advancedinstaller.com/security-updates-auto-updater.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://advanced.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"http://caphyon.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://gerr.re/posts/cve-2022-27438/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.advancedinstaller.com/security-updates-auto-updater.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…