{"api_version":"1","generated_at":"2026-04-22T19:53:54+00:00","cve":"CVE-2022-38168","urls":{"html":"https://cve.report/CVE-2022-38168","api":"https://cve.report/api/cve/CVE-2022-38168.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-38168","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-38168"},"summary":{"title":"CVE-2022-38168","description":"** UNSUPPPORTED WHEN ASSIGNED **Broken Access Control in User Authentication in Avaya Scopia Pathfinder 10 and 20 PTS version 8.3.7.0.4 allows remote unauthenticated attackers to bypass the login page, access sensitive information, and reset user passwords via URL modification.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-11-03 21:15:00","updated_at":"2023-11-07 03:50:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://medium.com/@rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae","name":"https://medium.com/@rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae","refsource":"MISC","tags":[],"title":"Avaya Scopia Pathfinder Broken Access Control | by Rob_NES | Aug, 2022 | Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://medium.com/%40rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae","name":"https://medium.com/%40rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae","refsource":"MISC","tags":[],"title":"Avaya Scopia Pathfinder Broken Access Control | by Rob_NES | Aug, 2022 | Medium","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-38168","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38168","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"38168","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"avaya","cpe5":"scopia_pathfinder_10_pts","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38168","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"avaya","cpe5":"scopia_pathfinder_10_pts_firmware","cpe6":"8.3.7.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38168","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"avaya","cpe5":"scopia_pathfinder_20_pts","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38168","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"avaya","cpe5":"scopia_pathfinder_20_pts_firmware","cpe6":"8.3.7.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-38168","ASSIGNER":"cve@mitre.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"** UNSUPPPORTED WHEN ASSIGNED **Broken Access Control in User Authentication in Avaya Scopia Pathfinder 10 and 20 PTS version 8.3.7.0.4 allows remote unauthenticated attackers to bypass the login page, access sensitive information, and reset user passwords via URL modification."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a","version_affected":"?"}]}}]}}]}},"references":{"reference_data":[{"url":"https://medium.com/%40rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae","refsource":"MISC","name":"https://medium.com/%40rob_nes/avaya-scopia-pathfinder-broken-access-control-ac792e995bae"}]}},"nvd":{"publishedDate":"2022-11-03 21:15:00","lastModifiedDate":"2023-11-07 03:50:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:avaya:scopia_pathfinder_10_pts_firmware:8.3.7.0.4:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:avaya:scopia_pathfinder_10_pts:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:avaya:scopia_pathfinder_20_pts_firmware:8.3.7.0.4:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:avaya:scopia_pathfinder_20_pts:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}