The Baxter Spectrum WBM is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information or cause a Denial of Service (DoS) on the WBM.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx | Broken Link |
https://www.cisa.gov/uscert/ics/advisories/icsma-22-251-01 | Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.0 |
References | () https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx - Broken Link |
Information
Published : 2022-09-09 15:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-26393
Mitre link : CVE-2022-26393
CVE.ORG link : CVE-2022-26393
JSON object : View
Products Affected
baxter
- sigma_spectrum_35700bax
- spectrum_wireless_battery_module_firmware
- sigma_spectrum_35700bax2
- baxter_spectrum_iq_35700bax3_firmware
- sigma_spectrum_35700bax2_firmware
- sigma_spectrum_35700bax_firmware
- spectrum_wireless_battery_module
- baxter_spectrum_iq_35700bax3
CWE
CWE-134
Use of Externally-Controlled Format String