Vulnerability Description
An issue was discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16, allows authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ericsson | Evolved Packet Gateway | >= 2.0, < 2.16 |
References
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
FAQ
What is CVE-2022-47531?
CVE-2022-47531 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16, allows authenticated users to bypass system CLI and execute commands they are authorized ...
How severe is CVE-2022-47531?
CVE-2022-47531 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47531?
Check the references section above for vendor advisories and patch information. Affected products include: Ericsson Evolved Packet Gateway.