CVE-2022-1300 (GCVE-0-2022-1300)
Vulnerability from cvelistv5
Published
2022-05-02 10:20
Modified
2024-09-17 01:05
Severity ?
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
Multiple Version of TRUMPF TruTops products expose a service function without necessary authentication. Execution of this function may result in unauthorized access to change of data or disruption of the whole service.
Impacted products
Vendor Product Version
TRUMPF TruTops Boost Version: V13.01   < unspecified
Version: unspecified   <
Version: V13.08.21
Create a notification for this product.
   TRUMPF TruTops Fab (incl. TruTops Monitor) Version: V22.01.   < unspecified
Version: unspecified   <
Version: V22.08.21
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:55:24.553Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-016/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TruTops Boost",
          "vendor": "TRUMPF",
          "versions": [
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "V13.01",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V13.05",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "V13.08.21"
            }
          ]
        },
        {
          "product": "TruTops Fab (incl. TruTops Monitor)",
          "vendor": "TRUMPF",
          "versions": [
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "V22.01.",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V22.05.",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "V22.08.21"
            }
          ]
        }
      ],
      "datePublic": "2022-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple Version of TRUMPF TruTops products expose a service function without necessary authentication. Execution of this function may result in unauthorized access to change of data or disruption of the whole service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-02T10:20:09",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-016/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Use the updated versions of the TRUMPF products that will be available via your service channel shortly or the hotfix in the reference."
        }
      ],
      "source": {
        "advisory": "VDE-2022-016",
        "defect": [
          "CERT@VDE#64101"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Missing authentication in TRUMPF products may result in corruption of data",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2022-05-02T10:00:00.000Z",
          "ID": "CVE-2022-1300",
          "STATE": "PUBLIC",
          "TITLE": "Missing authentication in TRUMPF products may result in corruption of data"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TruTops Boost",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_value": "V13.01"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V13.05"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "V13.08.21"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TruTops Fab (incl. TruTops Monitor)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_value": "V22.01."
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V22.05."
                          },
                          {
                            "version_affected": "=",
                            "version_value": "V22.08.21"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TRUMPF"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple Version of TRUMPF TruTops products expose a service function without necessary authentication. Execution of this function may result in unauthorized access to change of data or disruption of the whole service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-306 Missing Authentication for Critical Function"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en/advisories/VDE-2022-016/",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en/advisories/VDE-2022-016/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Use the updated versions of the TRUMPF products that will be available via your service channel shortly or the hotfix in the reference."
          }
        ],
        "source": {
          "advisory": "VDE-2022-016",
          "defect": [
            "CERT@VDE#64101"
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-1300",
    "datePublished": "2022-05-02T10:20:09.499479Z",
    "dateReserved": "2022-04-11T00:00:00",
    "dateUpdated": "2024-09-17T01:05:59.399Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-1300\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2022-05-02T12:16:26.433\",\"lastModified\":\"2024-11-21T06:40:26.760\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple Version of TRUMPF TruTops products expose a service function without necessary authentication. Execution of this function may result in unauthorized access to change of data or disruption of the whole service.\"},{\"lang\":\"es\",\"value\":\"Varias versiones de los productos TRUMPF TruTops exponen una funci\u00f3n de servicio sin la autenticaci\u00f3n necesaria. La ejecuci\u00f3n de esta funci\u00f3n puede resultar en un acceso no autorizado a la modificaci\u00f3n de datos o a la interrupci\u00f3n de todo el servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_boost:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.01\",\"versionEndIncluding\":\"13.05\",\"matchCriteriaId\":\"D3BBFC27-AE59-4232-99AA-183E9B4309DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_boost:13.08.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9189E82C-EE99-42CA-AF41-3F9FC6809DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_fab:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.01\",\"versionEndIncluding\":\"22.05\",\"matchCriteriaId\":\"60159EAB-0C92-4A26-A099-D6C2379E1054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_fab:22.08.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EC4E85-27E9-4F18-8A85-0C93573F4DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_monitor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.01\",\"versionEndIncluding\":\"22.05\",\"matchCriteriaId\":\"B86EF581-7BB8-4D87-A8EC-7A16BAAF065E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trumpf:trutops_monitor:22.08.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B80E74-C2DB-4A52-B2F2-4A8406A0D8A6\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en/advisories/VDE-2022-016/\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en/advisories/VDE-2022-016/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…