Vulnerability Description
3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 3Cx | 3Cx | < 18.0.3.461 |
Related Weaknesses (CWE)
References
- https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-inter
- https://www.3cx.com/blog/change-log/phone-system-change-log/Release Notes
- https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-inter
- https://www.3cx.com/blog/change-log/phone-system-change-log/Release Notes
FAQ
What is CVE-2022-48483?
CVE-2022-48483 is a vulnerability with a CVSS score of 7.5 (HIGH). 3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path compone...
How severe is CVE-2022-48483?
CVE-2022-48483 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48483?
Check the references section above for vendor advisories and patch information. Affected products include: 3Cx 3Cx.