Vulnerability Description
When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in the Middle) between a zero client and AWS session provisioner in the network. This issue is only applicable when connecting to an Amazon Workspace from a PCoIP Zero Client.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teradici | Tera2 Pcoip Zero Client Firmware | < 22.01.5 |
| Teradici | Tera2 Pcoip Zero Client | - |
Related Weaknesses (CWE)
References
- https://support.hp.com/us-en/document/ish_6545906-6545930-16/hpsbhf03794PatchVendor Advisory
- https://support.hp.com/us-en/document/ish_6545906-6545930-16/hpsbhf03794PatchVendor Advisory
FAQ
What is CVE-2022-1805?
CVE-2022-1805 is a vulnerability with a CVSS score of 8.1 (HIGH). When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in ...
How severe is CVE-2022-1805?
CVE-2022-1805 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1805?
Check the references section above for vendor advisories and patch information. Affected products include: Teradici Tera2 Pcoip Zero Client Firmware, Teradici Tera2 Pcoip Zero Client.