jvndb-2022-001477
Vulnerability from jvndb
Published
2022-03-23 12:08
Modified
2022-03-23 12:08
Severity ?
Summary
Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection
Details
Netcommunity OG410X and OG810X series provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION and NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION contain an OS command injection vulnerability (CWE-78, CVE-2022-22986).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to NTT East and NTT West and coordinated. NTT East, NTT West and JPCERT/CC published respective advisories in order to notify users of this vulnerability.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/vu/JVNVU94900322/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-22986 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-22986 | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001477.html", "dc:date": "2022-03-23T12:08+09:00", "dcterms:issued": "2022-03-23T12:08+09:00", "dcterms:modified": "2022-03-23T12:08+09:00", "description": "Netcommunity OG410X and OG810X series provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION and NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION contain an OS command injection vulnerability (CWE-78, CVE-2022-22986).\r\n\r\nChuya Hayakawa of 00One, Inc. reported this vulnerability to NTT East and NTT West and coordinated. NTT East, NTT West and JPCERT/CC published respective advisories in order to notify users of this vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001477.html", "sec:cpe": [ { "#text": "cpe:/o:ntt_east:og410xa_firmware", "@product": "Netcommunity OG410Xa firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_east:og410xi_firmware", "@product": "Netcommunity OG410Xi firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_east:og810xa_firmware", "@product": "Netcommunity OG810Xa firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_east:og810xi_firmware", "@product": "Netcommunity OG810Xi firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_west:netcommunity_0g410xa_firmware", "@product": "Netcommunity OG410Xa firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_west:netcommunity_0g410xi_firmware", "@product": "Netcommunity OG410Xi firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_west:netcommunity_0g810xa_firmware", "@product": "Netcommunity OG810Xa firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", "@version": "2.2" }, { "#text": "cpe:/o:ntt_west:netcommunity_0g810xi_firmware", "@product": "Netcommunity OG810Xi firmware", "@vendor": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", "@version": "2.2" } ], "sec:cvss": [ { "@score": "8.3", "@severity": "High", "@type": "Base", "@vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "@version": "2.0" }, { "@score": "8.0", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-001477", "sec:references": [ { "#text": "http://jvn.jp/en/vu/JVNVU94900322/index.html", "@id": "JVNVU#94900322", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-22986", "@id": "CVE-2022-22986", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-22986", "@id": "CVE-2022-22986", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.