Vulnerability Description
Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hitachi | Hc-Ip9100Hd Firmware | <= 1.07 |
| Hitachi | Hc-Ip9100Hd | - |
Related Weaknesses (CWE)
References
- https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5
- https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec
- https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5
- https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec
FAQ
What is CVE-2022-37681?
CVE-2022-37681 is a vulnerability with a CVSS score of 7.5 (HIGH). Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptip...
How severe is CVE-2022-37681?
CVE-2022-37681 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37681?
Check the references section above for vendor advisories and patch information. Affected products include: Hitachi Hc-Ip9100Hd Firmware, Hitachi Hc-Ip9100Hd.