Vulnerability Description
A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Circutor | Compact Dc-S Basic Firmware | 1.2.17 |
| Circutor | Compact Dc-S Basic | - |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01Third Party AdvisoryUS Government Resource
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2022-1669?
CVE-2022-1669 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once aut...
How severe is CVE-2022-1669?
CVE-2022-1669 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1669?
Check the references section above for vendor advisories and patch information. Affected products include: Circutor Compact Dc-S Basic Firmware, Circutor Compact Dc-S Basic.