{"vulnerability": "cve-2022-4278", "sightings": [{"uuid": "1891a066-a7cc-4027-930d-4859225e7d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42787", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14374", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42787\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\n\ud83d\udccf Published: 2022-11-10T11:06:20.856Z\n\ud83d\udccf Modified: 2025-05-01T19:01:20.740Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043", "creation_timestamp": "2025-05-01T19:14:57.000000Z"}, {"uuid": "7202b646-66bd-4a8f-bd83-acefd7ca0c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42785", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42785\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.\n\ud83d\udccf Published: 2022-11-10T11:01:41.011Z\n\ud83d\udccf Modified: 2025-05-01T19:02:00.365Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-05-01T19:14:56.000000Z"}, {"uuid": "3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42788\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T19:07:30.470Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488", "creation_timestamp": "2025-05-05T19:20:35.000000Z"}, {"uuid": "7d5f3e42-78ad-41fe-8633-61c1abc24f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42784", "type": "seen", "source": "https://t.me/ctinow/161676", "content": "https://ift.tt/K9hNx3S\nCVE-2022-42784 | Siemens LOGO 12 unknown vulnerability (ssa-844582)", "creation_timestamp": "2024-01-02T11:06:50.000000Z"}, {"uuid": "5f6f122e-1561-4bf6-acdb-ca39a8bb6be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/cibsecurity/52434", "content": "\u203c CVE-2022-42788 \u203c\n\nA permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T23:23:58.000000Z"}, {"uuid": "5a2ead7b-b078-4fd6-b275-392f8e59d3e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/cibsecurity/52878", "content": "\u203c CVE-2022-42786 \u203c\n\nMultiple W&amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:39:29.000000Z"}, {"uuid": "671dcd5a-d4c4-4ffa-bd61-8d9234bb959d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42786\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple W&amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\ud83d\udccf Published: 2022-11-10T11:02:32.615Z\n\ud83d\udccf Modified: 2025-04-29T14:56:50.373Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-04-29T15:11:40.000000Z"}]}