Vulnerabilites related to planex - cs-qr10
cve-2024-45836
Vulnerability from cvelistv5
Published
2024-09-26 04:07
Modified
2024-09-26 13:37
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN81966868/ |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | PLANEX COMMUNICATIONS INC. | CS-QR10 |
Version: all firmware versions |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45836", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T13:37:11.206613Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T13:37:20.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "CS-QR10", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR20", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR22", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR220", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] }, { "product": "CS-QR300", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "all firmware versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T04:07:37.035Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/jp/JVN81966868/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-45836", "datePublished": "2024-09-26T04:07:37.035Z", "dateReserved": "2024-09-10T06:57:27.511Z", "dateUpdated": "2024-09-26T13:37:20.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38399
Vulnerability from cvelistv5
Published
2022-09-08 07:10
Modified
2024-08-03 10:54
Severity ?
EPSS score ?
Summary
Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product's specific serial connection
References
▼ | URL | Tags |
---|---|---|
https://www.planex.co.jp/products/cs-qr10/index.shtml | x_refsource_MISC | |
https://www.planex.co.jp/products/cs-qr20/index.shtml | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU90766406/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PLANEX COMMUNICATIONS INC. | SmaCam CS-QR10 and SmaCam Night Vision CS-QR20 |
Version: All versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:54:03.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU90766406/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SmaCam CS-QR10 and SmaCam Night Vision CS-QR20", "vendor": "PLANEX COMMUNICATIONS INC.", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product\u0027s specific serial connection" } ], "problemTypes": [ { "descriptions": [ { "description": "Missing protection mechanism for alternate hardware interface", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-08T07:10:46", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU90766406/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-38399", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SmaCam CS-QR10 and SmaCam Night Vision CS-QR20", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "PLANEX COMMUNICATIONS INC." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product\u0027s specific serial connection" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing protection mechanism for alternate hardware interface" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.planex.co.jp/products/cs-qr10/index.shtml", "refsource": "MISC", "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "name": "https://www.planex.co.jp/products/cs-qr20/index.shtml", "refsource": "MISC", "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" }, { "name": "https://jvn.jp/en/vu/JVNVU90766406/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU90766406/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-38399", "datePublished": "2022-09-08T07:10:46", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T10:54:03.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202209-0467
Vulnerability from variot
Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product's specific serial connection. Planex Communications Co., Ltd. CS-QR20 firmware and cs-qr10 An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0467", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cs-qr10", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr20", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr10", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr20", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "cve": "CVE-2022-38399", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2022-38399", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38399", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-38399", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-38399", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202209-493", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "CNNVD", "id": "CNNVD-202209-493" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product\u0027s specific serial connection. Planex Communications Co., Ltd. CS-QR20 firmware and cs-qr10 An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38399" }, { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "VULMON", "id": "CVE-2022-38399" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38399", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU90766406", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2022-016812", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-493", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-38399", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-38399" }, { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "CNNVD", "id": "CNNVD-202209-493" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "id": "VAR-202209-0467", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44444445 }, "last_update_date": "2024-08-14T13:21:43.538000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "trust": 2.5, "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" }, { "trust": 2.5, "url": "https://jvn.jp/en/vu/jvnvu90766406/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90766406/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38399" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38399/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-38399" }, { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "CNNVD", "id": "CNNVD-202209-493" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-38399" }, { "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "db": "CNNVD", "id": "CNNVD-202209-493" }, { "db": "NVD", "id": "CVE-2022-38399" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-08T00:00:00", "db": "VULMON", "id": "CVE-2022-38399" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "date": "2022-09-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-493" }, { "date": "2022-09-08T08:15:08.247000", "db": "NVD", "id": "CVE-2022-38399" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-08T00:00:00", "db": "VULMON", "id": "CVE-2022-38399" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016812" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-493" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2022-38399" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Planex Communications Co., Ltd. \u00a0CS-QR20\u00a0 firmware and \u00a0cs-qr10\u00a0 Authentication vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016812" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-493" } ], "trust": 0.6 } }
var-202409-0992
Vulnerability from variot
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user. None
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202409-0992", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cs-qr220", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr20", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr300", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr22", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr10", "scope": "eq", "trust": 1.0, "vendor": "planex", "version": "*" }, { "model": "cs-qr10", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr300", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr22", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "mzk-dp300n", "scope": "lte", "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": "firmware 1.04 and earlier (cve-2024-45372)" }, { "model": "cs-qr20", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cs-qr220", "scope": null, "trust": 0.8, "vendor": "\u30d7\u30e9\u30cd\u30c3\u30af\u30b9\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u30ba\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "cve": "CVE-2024-45836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2024-45836", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2024-000101", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-45836", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2024-000101", "trust": 0.8, "value": "Medium" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user. None", "sources": [ { "db": "NVD", "id": "CVE-2024-45836" }, { "db": "JVNDB", "id": "JVNDB-2024-000101" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVN81966868", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2024-45836", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2024-000101", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "id": "VAR-202409-0992", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44444445 }, "last_update_date": "2024-10-04T02:28:39.604000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Planex Communications Inc. \u00a0 announcement page", "trust": 0.8, "url": "https://www.planex.co.jp/support/download/mzk-dp300n/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [IPA evaluation ]", "trust": 0.8 }, { "problemtype": " Cross-site request forgery (CWE-352) [IPA evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.0, "url": "https://jvn.jp/en/jp/jvn81966868/" }, { "trust": 0.8, "url": "https://jvn.jp/jp/jvn81966868/index.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "date": "2024-09-26T05:15:12.190000", "db": "NVD", "id": "CVE-2024-45836" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-09-24T03:10:00", "db": "JVNDB", "id": "JVNDB-2024-000101" }, { "date": "2024-10-03T00:35:53.797000", "db": "NVD", "id": "CVE-2024-45836" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in Planex network equipment", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-000101" } ], "trust": 0.8 } }
Vulnerability from fkie_nvd
Published
2024-09-26 05:15
Modified
2024-10-03 00:35
Severity ?
Summary
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN81966868/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
planex | cs-qr10_firmware | * | |
planex | cs-qr10 | - | |
planex | cs-qr20_firmware | * | |
planex | cs-qr20 | - | |
planex | cs-qr22_firmware | * | |
planex | cs-qr22 | - | |
planex | cs-qr220_firmware | * | |
planex | cs-qr220 | - | |
planex | cs-qr300_firmware | * | |
planex | cs-qr300 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FEF99E1-D1F1-472E-B4FB-C5C0BEA5903C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "A29EFF41-EBB0-40BB-B902-1E06991F241C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48F417C4-00BF-4DD6-B13F-5CE3689CACC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFA7189-C7EF-4B2C-A395-C65227DC0E68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr22_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F451BA4-F787-4A91-8159-B10CEB250F49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr22:-:*:*:*:*:*:*:*", "matchCriteriaId": "22EF5100-73AF-4ECE-A872-0BC8DA6FAF2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B69D307-B421-4F84-917C-410A6847F522", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr220:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F63CDED-D6F4-438D-A2CC-A51444938EAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9F555D9-F3D2-4588-ACD8-B5E414A3594C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8926972-BCAF-4FDA-82CF-7AFC5EFDB410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross Site Scripting en la p\u00e1gina de administraci\u00f3n web de las c\u00e1maras de red PLANEX COMMUNICATIONS. Si un usuario conectado accede a un archivo espec\u00edfico, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario." } ], "id": "CVE-2024-45836", "lastModified": "2024-10-03T00:35:53.797", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-26T05:15:12.190", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN81966868/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "vultures@jpcert.or.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-08 08:15
Modified
2024-11-21 07:16
Severity ?
Summary
Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product's specific serial connection
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
planex | cs-qr20_firmware | * | |
planex | cs-qr20 | - | |
planex | cs-qr10_firmware | * | |
planex | cs-qr10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48F417C4-00BF-4DD6-B13F-5CE3689CACC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFA7189-C7EF-4B2C-A395-C65227DC0E68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:planex:cs-qr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FEF99E1-D1F1-472E-B4FB-C5C0BEA5903C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:planex:cs-qr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "A29EFF41-EBB0-40BB-B902-1E06991F241C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing protection mechanism for alternate hardware interface in SmaCam CS-QR10 all versions and SmaCam Night Vision CS-QR20 all versions allows an attacker to execute an arbitrary OS command by having the product connect to the product\u0027s specific serial connection" }, { "lang": "es", "value": "Una falta en el mecanismo de protecci\u00f3n para la interfaz de hardware alternativa en SmaCam CS-QR10 todas las versiones y SmaCam Night Vision CS-QR20 todas las versiones permite a un atacante ejecutar un comando arbitrario del Sistema Operativo al hacer que el producto se conecte a la conexi\u00f3n en serie espec\u00edfica del producto" } ], "id": "CVE-2022-38399", "lastModified": "2024-11-21T07:16:23.913", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-08T08:15:08.247", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU90766406/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Product" ], "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Product" ], "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU90766406/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.planex.co.jp/products/cs-qr10/index.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.planex.co.jp/products/cs-qr20/index.shtml" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }