Vulnerabilites related to sick - rfu630-04100s01
Vulnerability from fkie_nvd
Published
2022-12-13 16:15
Modified
2024-11-21 07:31
Summary
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70EF7DDD-C108-4F2F-923F-2CA69367CC6B",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A25A71C-BD2B-451A-B616-F13E827ABBEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04100s01_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7214D9B3-34C9-414E-B855-0890FDF68091",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04100s01:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02C6911-4DED-43A5-A53D-1204EC12D8FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04101_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F52483C1-D518-4A88-BEBA-33520A340139",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "979F6063-2026-46F9-95AE-7809D8552EAE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04102_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EF3A61-D58B-447C-BC1B-232D58609827",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04102:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE25B323-CE5A-4E0F-895D-1A06CB2A759B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04103_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ECE1E40-927F-48B1-9DCE-BC3BD85BAF18",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04103:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D846DCF4-E711-4938-921D-F2B63095628A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04104_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA325DAB-C9AE-40C3-9400-2D07370B9101",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "305C1449-FE03-4FC2-9B56-F8EC70768B48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04105_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE7AA4F-53D8-4AE9-B48D-F2B5ACDF5FCD",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B96AF0-C044-4D26-BD27-B850E9F3D555",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04106_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "925DE8FE-DF38-4F54-A6CF-689807F3E81D",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8C1EE3-7029-4D75-8912-58CC33131350",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04109_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "191684F2-2845-4D51-AA15-4C394660F960",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04109:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F65DAC2-067A-4A9C-ACBF-71079BF39A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-04117_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CFE84A-ECD4-41B9-89F6-6160896E8B41",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-04117:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D291B344-7002-4D9F-83EA-2E71B3496B04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13100s01_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA5D46D-3557-44A9-AE61-B4E343AA974E",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13100s01:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "297B6772-D937-4007-8FCF-0E01F3118EC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13101_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A80A51-C591-455F-93E6-BC18A38F9993",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA44013-43DF-4848-8A03-79E20490A775",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13102_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65784FAB-553E-45CC-BBC0-98CA91818BCC",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13102:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5075AD7C-0AEE-4BEE-A41C-91E597681707",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13103_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75DB141-EC20-42A1-B38F-A22A0F8F1F84",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13103:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83895AE6-D1D0-4C48-BDBC-643E83D10296",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13104_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "692DC244-F6F7-40B9-82AF-5CAC009E9E56",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7018A9E9-5256-479F-A117-08F5483B610E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13105_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE7EA20-2E95-4738-A663-12E839E7E343",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "594A612A-7412-45B3-B2B8-8AC914DF5E2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13106_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C28666-AC4D-4775-815D-24BDF99F33BD",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9210CC-CA0B-4CE8-913F-2ACE8645FAC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13107_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "63F82B8B-CB6A-4FB4-A0D0-6D622FAE59AF",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13107:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C5D804-DDDA-48E3-B3DF-055BB40D617D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13108_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94655225-D330-4AC2-A0F9-72C92E6B07F2",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E53461-A275-4309-92B9-9D0CD7ABBC2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13110_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E43A3B57-7DD2-4405-A595-D11AF9239C7E",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D6C816-6C82-449D-B8B9-86E124308C0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13111_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D40CB92-F627-40C3-9F79-9EB2083CE215",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13111:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F3879B-AD5F-4D02-BDA8-077726F97EEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13113_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45B20C-A15D-4C2A-88A7-4F6CFE5025F4",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13113:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C0C79B-4A87-413B-8F85-4D77901DB7DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13114_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6354CD6D-C6B9-4754-83C0-54DFFD734339",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13114:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88011835-0802-494D-BC22-2C425FCBF74E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sick:rfu630-13115_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2AC8E3-43B4-4E92-AA4B-52DB82D994A3",
              "versionEndExcluding": "2.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sick:rfu630-13115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440F9FA-4C6F-4F0C-80CD-FCB09D6612C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version \u003c v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."
    },
    {
      "lang": "es",
      "value": "Uso de un algoritmo criptogr\u00e1fico defectuoso o riesgoso en la versi\u00f3n de firmware SICK RFU63x \u0026lt; v2.21 permite a un atacante remoto con pocos privilegios descifrar los datos cifrados si el usuario solicita que se utilicen conjuntos de cifrado d\u00e9biles para el cifrado a trav\u00e9s de la interfaz SSH. El parche y el procedimiento de instalaci\u00f3n para la actualizaci\u00f3n del firmware est\u00e1n disponibles a trav\u00e9s de la persona de contacto responsable con el cliente de SICK."
    }
  ],
  "id": "CVE-2022-46833",
  "lastModified": "2024-11-21T07:31:08.473",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-12-13T16:15:26.160",
  "references": [
    {
      "source": "psirt@sick.de",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sick.com/psirt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sick.com/psirt"
    }
  ],
  "sourceIdentifier": "psirt@sick.de",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "psirt@sick.de",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-46833
Vulnerability from cvelistv5
Published
2022-12-13 00:00
Modified
2024-08-03 14:39
Severity ?
Summary
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Impacted products
Vendor Product Version
n/a SICK RFU63x Firmware Version: <v2.21
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:39:38.728Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sick.com/psirt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SICK RFU63x Firmware",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "\u003cv2.21"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version \u003c v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "CWE-327",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-13T00:00:00",
        "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
        "shortName": "SICK AG"
      },
      "references": [
        {
          "url": "https://sick.com/psirt"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
    "assignerShortName": "SICK AG",
    "cveId": "CVE-2022-46833",
    "datePublished": "2022-12-13T00:00:00",
    "dateReserved": "2022-12-08T00:00:00",
    "dateUpdated": "2024-08-03T14:39:38.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}