CVE-2022-3927

Severity CVSS v4.0:
Pending analysis
Type:
CWE-798 Use of Hard-coded Credentials
Publication date:
05/01/2023
Last modified:
07/11/2023

Description

<br /> The affected products store both public and private key that are used to sign and<br /> protect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change<br /> the CPS file, sign it so that it is trusted as the legitimate CPS file.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects <br /> <br /> <br /> <br /> * FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; <br /> * UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.<br /> <br /> <br /> <br /> <br /> List of CPEs: <br /> * cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*<br /> <br /> * cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*<br /> <br /> * cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*<br /> * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:hitachienergy:foxman-un:*:*:*:*:*:*:*:* r16a (excluding)
cpe:2.3:a:hitachienergy:unem:*:*:*:*:*:*:*:* r16a (excluding)