CVE-2022-22521

In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:miele:benchmark_programming_tool:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:46

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - Exploit, Patch, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - Exploit, Patch, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2022/Apr/42 - Exploit, Mailing List, Patch, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Apr/42 - Exploit, Mailing List, Patch, Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2022-015/ - Mitigation, Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2022-015/ - Mitigation, Third Party Advisory
References () https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - Patch, Product, Release Notes, Vendor Advisory () https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - Patch, Product, Release Notes, Vendor Advisory

16 Sep 2024, 18:15

Type Values Removed Values Added
Summary (en) In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin. (en) In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

09 Aug 2023, 11:15

Type Values Removed Values Added
Summary In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin. In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

27 Jun 2023, 19:00

Type Values Removed Values Added
CWE CWE-269 CWE-732

12 May 2022, 19:43

Type Values Removed Values Added
References (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ - (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ - Mitigation, Third Party Advisory

11 May 2022, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-015/ -
Summary In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed by users with administrative privileges. An attacker could thereby obtain higher permissions. The attacker must already have access to the corresponding local system to be able to exchange the files. In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

06 May 2022, 15:12

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html - Exploit, Patch, Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 - Exploit, Mailing List, Patch, Third Party Advisory
References (MISC) https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - (MISC) https://www.miele.de/p/miele-benchmark-programming-tool-2296.htm - Patch, Product, Release Notes, Vendor Advisory
CPE cpe:2.3:a:miele:benchmark_programming_tool:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.9
v3 : 7.3

27 Apr 2022, 21:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html -

27 Apr 2022, 19:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Apr/42 -

27 Apr 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-27 16:15

Updated : 2024-11-21 06:46


NVD link : CVE-2022-22521

Mitre link : CVE-2022-22521

CVE.ORG link : CVE-2022-22521


JSON object : View

Products Affected

miele

  • benchmark_programming_tool
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource