CVE-2022-3928
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
05/01/2023
Last modified:
07/11/2023
Description
<br />
Hardcoded credential is found in affected products&#39; message queue. An attacker that manages to exploit this vulnerability will be able to access data to the internal message queue.<br />
<br />
<br />
<br />
This issue affects <br />
<br />
<br />
<br />
* FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; <br />
* UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.<br />
<br />
<br />
<br />
<br />
List of CPEs: <br />
* cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*<br />
<br />
* cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*<br />
<br />
* cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:hitachienergy:foxman-un:*:*:*:*:*:*:*:* | r16a (excluding) | |
| cpe:2.3:a:hitachienergy:unem:*:*:*:*:*:*:*:* | r16a (excluding) |
To consult the complete list of CPE names with products and versions, see this page



