V
Scaner-VSvulnerability catalog · v4.2
CVE-2022-31479
CVE
CriticalConfirmedExploit available

An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed durin…

CVSS
9.8
Critical
EPSS
0.09
p92
Published
2022-01-01
Updated
2022-01-01
Description

An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. The injected commands only get executed during start up or when unsafe calls regarding the hostname are used. This allows the attacker to gain remote access to the device and can make their persistence permanent by modifying the filesystem.

Tags · CWE
Pre-auth
CWE-693
CAPEC-1
CAPEC-17
CAPEC-20
CAPEC-22
CAPEC-36
CAPEC-51
CAPEC-57
CAPEC-59
CAPEC-65
CAPEC-74
CAPEC-87
CAPEC-107
CAPEC-127
CAPEC-237
CAPEC-477
CAPEC-480
CAPEC-668
Affected products
Ep4502_firmwareLenels2_lnl-4420_firmwareLenels2_lnl-x2210_firmwareLenels2_lnl-x2220_firmwareLenels2_lnl-x3300_firmwareLenels2_lnl-x4420_firmwareLenels2_s2-lp-1501_firmwareLenels2_s2-lp-1502_firmwareLenels2_s2-lp-2500_firmwareLenels2_s2-lp-4502_firmwareLp1501_firmwareLp1502_firmwareLp2500_firmwareLp4502_firmware
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Timeline
2022-01-01
Published
2022-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.091 · p92
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-57 · CWE-693
└ via CAPEC-127 · CWE-693
└ via CAPEC-668 · CWE-693
└ via CAPEC-480 · CWE-693
Known exploits — Сканер-ВС
CVE-2022-31479
github-poc · https://github.com/realyme/CVE-2022-31479-test
Enterprise
Affected software
ProductVendorStatus
ep4502_firmware*Tracked
lenels2_lnl-4420_firmware*Tracked
lenels2_lnl-x2210_firmware*Tracked
lenels2_lnl-x2220_firmware*Tracked
lenels2_lnl-x3300_firmware*Tracked
lenels2_lnl-x4420_firmware*Tracked
lenels2_s2-lp-1501_firmware*Tracked
lenels2_s2-lp-1502_firmware*Tracked
lenels2_s2-lp-2500_firmware*Tracked
lenels2_s2-lp-4502_firmware*Tracked
lp1501_firmware*Tracked
lp1502_firmware*Tracked
lp2500_firmware*Tracked
lp4502_firmware*Tracked
Source databases
CVE
Related vulnerabilities