CVE-2022-33944

The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object references vulnerability on endpoint and POST parameter “Device ID,” which accepts arbitrary device IDs.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*

History

27 Jul 2022, 21:42

Type Values Removed Values Added
References (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

20 Jul 2022, 17:28

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-20 16:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-33944

Mitre link : CVE-2022-33944

CVE.ORG link : CVE-2022-33944


JSON object : View

Products Affected

micodus

  • mv720_firmware
  • mv720
CWE
CWE-639

Authorization Bypass Through User-Controlled Key