Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-21828


A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3.


Published

2022-03-04T17:15:07.897

Last Modified

2024-11-21T06:45:31.007

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-502
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ivanti incapptic_connect 1.35.3 Yes
Application ivanti incapptic_connect 1.35.4 Yes
Application ivanti incapptic_connect 1.35.5 Yes
Application ivanti incapptic_connect 1.36.0 Yes
Application ivanti incapptic_connect 1.37.0 Yes
Application ivanti incapptic_connect 1.37.1 Yes
Application ivanti incapptic_connect 1.38.0 Yes
Application ivanti incapptic_connect 1.38.1 Yes
Application ivanti incapptic_connect 1.39.0 Yes
Application ivanti incapptic_connect 1.39.1 Yes
Application ivanti incapptic_connect 1.40.0 Yes

References