CVE-2022-34150

The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*

History

27 Jul 2022, 21:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:h:micodus:mv720:-:*:*:*:*:*:*:*
cpe:2.3:o:micodus:mv720_firmware:-:*:*:*:*:*:*:*
References (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - Third Party Advisory, US Government Resource
CWE CWE-639

20 Jul 2022, 17:28

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-20 16:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-34150

Mitre link : CVE-2022-34150

CVE.ORG link : CVE-2022-34150


JSON object : View

Products Affected

micodus

  • mv720_firmware
  • mv720
CWE
CWE-639

Authorization Bypass Through User-Controlled Key