CVE-2022-2338
Summary
| CVE | CVE-2022-2338 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-17 21:15:00 UTC |
| Updated | 2022-08-19 12:36:00 UTC |
| Description | Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server. |
Risk And Classification
Problem Types: CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Softing | Edgeaggregator | 3.1 | All | All | All |
| Application | Softing | Edgeconnector | 3.1 | All | All | All |
| Application | Softing | Opc | 5.2 | All | All | All |
| Application | Softing | Opc Ua C Software Development Kit | 6 | All | All | All |
| Application | Softing | Secure Integration Server | 1.22 | All | All | All |
| Application | Softing | Uagates | 1.74 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Softing Secure Integration Server | CISA | CONFIRM | www.cisa.gov | |
| SYT-2022-5: Remote code execution vulnerability in configuration restore functionality of Secure Integration Server | CONFIRM | industrial.softing.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA.
Legacy QID Mappings
- 591147 Softing Secure Integration Server Multiple Vulnerabilities (ICSA-22-228-04)