var-202301-2330
Vulnerability from variot

The Remote Mount feature can potentially be abused by valid, authenticated users to make connections to internal services that may not normally be accessible to users. Internal service access controls, as applicable, remain in effect. plural Lenovo An improper comparison vulnerability exists in the product.Information may be obtained

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202301-2330",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "thinksystem sr850",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile hx7521",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx2321",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx2720-e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile mx3530-h",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem st250 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.96_tgbt34x"
      },
      {
        "model": "thinksystem sd530",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem st250",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile vx3720",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem sr258 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.96_tgbt34x"
      },
      {
        "model": "thinksystem sr650 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile hx3721",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile hx3321",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx1021",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinksystem st550",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sr665",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.10_d8bt38l"
      },
      {
        "model": "thinksystem sr150",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem sr250",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile mx3531-f",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile hx3376",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.10_d8bt38l"
      },
      {
        "model": "thinkagile vx 2u4n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile mx3530 f",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile vx7520 n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile mx3531 h",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr670 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinkagile vx7531",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile vx5530",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile vx3320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sn850",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile mx1021",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinksystem sr645",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.10_d8bt38l"
      },
      {
        "model": "thinksystem st258 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.96_tgbt34x"
      },
      {
        "model": "thinkagile vx 4u",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.50_psi346l"
      },
      {
        "model": "thinkagile hx5521-c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sn550 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinkagile vx7520",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem st650 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinkagile mx3330-h",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr590",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile mx3331-f",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr630",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx1320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem sr850p",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinksystem sr158",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile vx3520-g",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx7320 n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx5520",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx7820",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.50_psi346l"
      },
      {
        "model": "thinksystem sn550",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem sr650",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sr860",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile hx3375",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "4.10_d8bt38l"
      },
      {
        "model": "thinkagile vx2320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx5520",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sd650 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinksystem sr570",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx2320-e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx1520-r",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx3320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx3521-g",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sr550",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx7820",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.50_psi346l"
      },
      {
        "model": "thinkagile hx7821",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.50_psi346l"
      },
      {
        "model": "thinkagile hx3520-g",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sr950",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.50_psi346l"
      },
      {
        "model": "thinkagile mx1020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinkagile hx1320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx5521",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx3530-g",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile hx1321",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinksystem sd650-n v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinksystem sr670",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinkagile mx3331-h",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr860 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinksystem st258",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem st658 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinksystem sr850 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinkagile hx3720",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkstation p920",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx5520-c",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx enclosure certified node",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile vx7330",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile vx7530",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr250 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.96_tgbt34x"
      },
      {
        "model": "thinksystem sd630 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "2.00_tgbt36o"
      },
      {
        "model": "thinkagile vx3331",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sr530",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile vx 1se certified node",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinksystem sr630 v2",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile hx1521-r",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile mx3330-f",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinksystem sd650 dwc",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile vx2330",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkagile vx3330",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.80_afbt20n"
      },
      {
        "model": "thinkedge se450",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "1.10_usx304w"
      },
      {
        "model": "thinksystem se350",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "3.60_tei386m"
      },
      {
        "model": "thinksystem sr258",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "5.20_tei3c8m"
      },
      {
        "model": "thinkagile hx7520",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "lenovo",
        "version": "8.40-cdi394n"
      },
      {
        "model": "thinkagile hx1520-r",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx1521-r",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx1321",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx2320-e",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx2720-e",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile vx3331",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx enclosure certified node",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx1021",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx1320",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      },
      {
        "model": "thinkagile hx2321",
        "scope": null,
        "trust": 0.8,
        "vendor": "lenovo",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "cve": "CVE-2022-34888",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2022-34888",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "psirt@lenovo.com",
            "availabilityImpact": "LOW",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.2,
            "id": "CVE-2022-34888",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2022-34888",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-34888",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "psirt@lenovo.com",
            "id": "CVE-2022-34888",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "NVD",
            "id": "CVE-2022-34888",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202301-2376",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Remote Mount feature can potentially be abused by valid, authenticated users to make connections to internal services that may not normally be accessible to users. Internal service access controls, as applicable, remain in effect. plural Lenovo An improper comparison vulnerability exists in the product.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-34888"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-34888",
        "trust": 3.3
      },
      {
        "db": "LENOVO",
        "id": "LEN-87734",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-34888",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "id": "VAR-202301-2330",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.625
  },
  "last_update_date": "2024-08-14T15:00:33.556000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "LEN-87734",
        "trust": 0.8,
        "url": "https://support.lenovo.com/us/en/product_security/LEN-87734"
      },
      {
        "title": "Lenovo XClarity Controller Security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223622"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/Live-Hack-CVE/CVE-2022-34888 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-697",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-184",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate comparison (CWE-697) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://support.lenovo.com/us/en/product_security/len-87734"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34888"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-34888/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/live-hack-cve/cve-2022-34888"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-01-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "date": "2023-08-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "date": "2023-01-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "date": "2023-01-30T22:15:11.960000",
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-01-31T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-34888"
      },
      {
        "date": "2023-08-31T02:42:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      },
      {
        "date": "2023-02-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      },
      {
        "date": "2023-02-08T22:18:21.590000",
        "db": "NVD",
        "id": "CVE-2022-34888"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0Lenovo\u00a0 Improper Comparison Vulnerability in Products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-012565"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202301-2376"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.