CVE-2024-22028 (GCVE-0-2024-22028)
Vulnerability from cvelistv5
Published
2024-01-15 06:53
Modified
2025-06-03 14:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Insufficient verification of data authenticity
Summary
Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.
References
| URL | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| THREE R SOLUTION CORP. JAPAN | 3R-TMC01 |
Version: all firmware versions |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://3rrr-btob.jp/archives/news/23624"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN96240417/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-22028",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-08T17:36:05.680907Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-03T14:01:12.809Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "3R-TMC01",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
},
{
"product": "3R-TMC02",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
},
{
"product": "3R-TMC03",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
},
{
"product": "3R-TMC04",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
},
{
"product": "3R-TMC05",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
},
{
"product": "3R-TMC06",
"vendor": "THREE R SOLUTION CORP. JAPAN",
"versions": [
{
"status": "affected",
"version": "all firmware versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Insufficient verification of data authenticity",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-15T06:53:27.089Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://3rrr-btob.jp/archives/news/23624"
},
{
"url": "https://jvn.jp/en/jp/JVN96240417/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-22028",
"datePublished": "2024-01-15T06:53:27.089Z",
"dateReserved": "2024-01-04T02:17:28.653Z",
"dateUpdated": "2025-06-03T14:01:12.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-22028\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-01-15T07:15:09.507\",\"lastModified\":\"2025-06-03T14:15:45.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.\"},{\"lang\":\"es\",\"value\":\"Existe un problema de documentaci\u00f3n t\u00e9cnica insuficiente en todas las versiones de firmware de la c\u00e1mara t\u00e9rmica serie TMC. El usuario del producto afectado no conoce los datos guardados internamente. Al acceder f\u00edsicamente al producto afectado, un atacante puede recuperar los datos internos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc01_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98EEB41C-0F8C-4A26-A3BC-60653B4502C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc01:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4970BECE-6B13-42AA-A5CC-BA61156797C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc02_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A50A1E-64DD-4C58-B9E5-35EE6CA14FDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc02:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF69C40-D7BE-4CD1-840C-4D38D4098088\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc03_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBC978F-3938-44BA-8434-DEB10DCE0C12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc03:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C7D526D-D539-4C5B-97CF-4BF42865FF9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc04_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F7B278-C4EA-4745-9CD8-31E3C8B182AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338343F1-FCEF-457A-ABF7-4D0C1FE683D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc05_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB209B1E-0EA7-4055-8A83-C9E15D852780\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc05:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E1DF8-8C35-4AC0-B59A-F5ADE5319304\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:3rrr-btob:3r-tmc06_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B0BD30-194A-4ED3-AAEF-75624FA9527C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:3rrr-btob:3r-tmc06:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582D63B0-129D-4C07-9336-F7E98748571E\"}]}]}],\"references\":[{\"url\":\"https://3rrr-btob.jp/archives/news/23624\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\"]},{\"url\":\"https://jvn.jp/en/jp/JVN96240417/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://3rrr-btob.jp/archives/news/23624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://jvn.jp/en/jp/JVN96240417/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://3rrr-btob.jp/archives/news/23624\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN96240417/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:35:34.809Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.6, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22028\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T17:36:05.680907Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T17:36:07.315Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC01\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}, {\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC02\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}, {\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC03\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}, {\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC04\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}, {\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC05\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}, {\"vendor\": \"THREE R SOLUTION CORP. JAPAN\", \"product\": \"3R-TMC06\", \"versions\": [{\"status\": \"affected\", \"version\": \"all firmware versions\"}]}], \"references\": [{\"url\": \"https://3rrr-btob.jp/archives/news/23624\"}, {\"url\": \"https://jvn.jp/en/jp/JVN96240417/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Insufficient verification of data authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2024-01-15T06:53:27.089Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-22028\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-03T14:01:12.809Z\", \"dateReserved\": \"2024-01-04T02:17:28.653Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2024-01-15T06:53:27.089Z\", \"assignerShortName\": \"jpcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…