CVE-2022-22521

In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.
References
Link Resource
http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html Exploit Patch Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2022/Apr/42 Exploit Mailing List Patch Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-015/ Mitigation Third Party Advisory
https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm Patch Product Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:miele:benchmark_programming_tool:*:*:*:*:*:*:*:*

History

16 Sep 2024, 18:15

Type Values Removed Values Added
Summary (en) In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin. (en) In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

09 Aug 2023, 11:15

Type Values Removed Values Added
Summary In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin. In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

27 Jun 2023, 19:00

Type Values Removed Values Added
CWE CWE-269 CWE-732

12 May 2022, 19:43

Type Values Removed Values Added
References (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ - (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ - Mitigation, Third Party Advisory

11 May 2022, 13:15

Type Values Removed Values Added
Summary In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed by users with administrative privileges. An attacker could thereby obtain higher permissions. The attacker must already have access to the corresponding local system to be able to exchange the files. In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.
References
  • (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ -

06 May 2022, 15:12

Type Values Removed Values Added
CPE cpe:2.3:a:miele:benchmark_programming_tool:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.9
v3 : 7.3
References (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - Exploit, Patch, Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 - Exploit, Mailing List, Patch, Third Party Advisory
References (MISC) https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - (MISC) https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - Patch, Product, Release Notes, Vendor Advisory

27 Apr 2022, 21:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html -

27 Apr 2022, 19:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 -

27 Apr 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-27 16:15

Updated : 2024-09-16 18:15


NVD link : CVE-2022-22521

Mitre link : CVE-2022-22521

CVE.ORG link : CVE-2022-22521


JSON object : View

Products Affected

miele

  • benchmark_programming_tool
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource