CVE-2022-1805

When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in the Middle) between a zero client and AWS session provisioner in the network. This issue is only applicable when connecting to an Amazon Workspace from a PCoIP Zero Client.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:teradici:tera2_pcoip_zero_client_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:teradici:tera2_pcoip_zero_client_firmware:22.04:*:*:*:*:*:*:*
cpe:2.3:h:teradici:tera2_pcoip_zero_client:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
References () https://support.hp.com/us-en/document/ish_6545906-6545930-16/hpsbhf03794 - Patch, Vendor Advisory () https://support.hp.com/us-en/document/ish_6545906-6545930-16/hpsbhf03794 - Patch, Vendor Advisory

Information

Published : 2022-07-28 15:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1805

Mitre link : CVE-2022-1805

CVE.ORG link : CVE-2022-1805


JSON object : View

Products Affected

teradici

  • tera2_pcoip_zero_client_firmware
  • tera2_pcoip_zero_client
CWE
CWE-295

Improper Certificate Validation