Vulnerability Description
An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafted payload injected into the license input.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Telosalliance | Omnia Mpx Node Firmware | 1.3.37 |
| Telosalliance | Omnia Mpx Node | - |
Related Weaknesses (CWE)
References
- https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325ExploitThird Party Advisory
- https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325ExploitThird Party Advisory
FAQ
What is CVE-2022-43325?
CVE-2022-43325 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafte...
How severe is CVE-2022-43325?
CVE-2022-43325 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-43325?
Check the references section above for vendor advisories and patch information. Affected products include: Telosalliance Omnia Mpx Node Firmware, Telosalliance Omnia Mpx Node.