Vulnerabilites related to Dataprobe, Inc. - Dataprobe iBoot-PDU FW
CVE-2022-47320 (GCVE-0-2022-47320)
Vulnerability from cvelistv5
Published
2023-05-22 22:30
Modified
2025-01-16 21:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The iBoot device’s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:47:29.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-47320", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T20:30:04.571383Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:32:32.071Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The iBoot device\u2019s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:30:59.073Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-47320", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-47320" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-47320", "datePublished": "2023-05-22T22:30:59.073Z", "dateReserved": "2022-12-21T17:02:52.826Z", "dateUpdated": "2025-01-16T21:32:32.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-47311 (GCVE-0-2022-47311)
Vulnerability from cvelistv5
Published
2023-05-22 22:12
Modified
2025-01-16 21:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:47:29.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-47311", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T20:21:00.772667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:32:39.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:12:51.152Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-47311", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-47311" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-47311", "datePublished": "2023-05-22T22:12:51.152Z", "dateReserved": "2022-12-21T17:02:52.831Z", "dateUpdated": "2025-01-16T21:32:39.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-46738 (GCVE-0-2022-46738)
Vulnerability from cvelistv5
Published
2023-05-22 22:36
Modified
2025-01-16 21:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-46738", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T20:55:23.679981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:32:24.823Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1391 Use of Weak Credentials", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:36:40.682Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-46738", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-46738" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-46738", "datePublished": "2023-05-22T22:36:40.682Z", "dateReserved": "2022-12-21T17:02:52.835Z", "dateUpdated": "2025-01-16T21:32:24.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-46658 (GCVE-0-2022-46658)
Vulnerability from cvelistv5
Published
2023-05-22 22:46
Modified
2025-01-16 21:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-46658", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T20:20:57.839826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:32:18.146Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:47:02.167Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-46658", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-46658" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-46658", "datePublished": "2023-05-22T22:46:13.216Z", "dateReserved": "2022-12-21T17:02:52.840Z", "dateUpdated": "2025-01-16T21:32:18.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-4945 (GCVE-0-2022-4945)
Vulnerability from cvelistv5
Published
2023-05-22 21:15
Modified
2025-01-16 21:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Dataprobe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user's cloud.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:46.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-4945", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T20:21:03.832855Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:32:47.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The Dataprobe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user\u0027s cloud." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-256 Plaintext Storage of a Password", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T21:15:33.441Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-4945", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-4945" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-4945", "datePublished": "2023-05-22T21:15:33.441Z", "dateReserved": "2023-04-26T15:24:49.548Z", "dateUpdated": "2025-01-16T21:32:47.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }