The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin.
References
Link | Resource |
---|---|
https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf | Product |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
History
31 May 2023, 01:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:* cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03 - Patch, Third Party Advisory, US Government Resource | |
References | (MISC) https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf - Product |
22 May 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-22 23:15
Updated : 2024-02-04 23:37
NVD link : CVE-2022-46738
Mitre link : CVE-2022-46738
CVE.ORG link : CVE-2022-46738
JSON object : View
Products Affected
dataprobe
- iboot-pdu8sa-n20_firmware
- iboot-pdu4sa-n15_firmware
- iboot-pdu4a-n20
- iboot-pdu4a-n20_firmware
- iboot-pdu8a-2c20
- iboot-pdu4a-n15
- iboot-pdu8a-c10
- iboot-pdu8sa-c10
- iboot-pdu8a-2c20_firmware
- iboot-pdu8sa-2n15
- iboot-pdu4-n20
- iboot-pdu4a-c20
- iboot-pdu8sa-c10_firmware
- iboot-pdu8a-2n15_firmware
- iboot-pdu8a-c10_firmware
- iboot-pdu4-n20_firmware
- iboot-pdu4-c20_firmware
- iboot-pdu8a-n15
- iboot-pdu8a-c20
- iboot-pdu4sa-c20_firmware
- iboot-pdu8a-2n15
- iboot-pdu8a-2c10
- iboot-pdu4sa-n20
- iboot-pdu8a-2c10_firmware
- iboot-pdu8a-c20_firmware
- iboot-pdu8a-2n20_firmware
- iboot-pdu8a-n20
- iboot-pdu4sa-c20
- iboot-pdu4sa-n15
- iboot-pdu4a-c10
- iboot-pdu8a-2n20
- iboot-pdu4a-n15_firmware
- iboot-pdu4sa-n20_firmware
- iboot-pdu4sa-c10_firmware
- iboot-pdu8a-n20_firmware
- iboot-pdu8sa-n15
- iboot-pdu8sa-n20
- iboot-pdu8a-n15_firmware
- iboot-pdu4a-c10_firmware
- iboot-pdu8sa-2n15_firmware
- iboot-pdu4-c20
- iboot-pdu8sa-n15_firmware
- iboot-pdu4a-c20_firmware
- iboot-pdu4sa-c10
CWE
No CWE.