CVE-2022-28717

Cross-site scripting vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, WATCH BOOT mini RPC-M4H [End of Sale] all firmware versions, WATCH BOOT nino RPC-M2CS firmware version 1.00A to 1.00D, WATCH BOOT light RPC-M5CS firmware version 1.00A to 1.00D, WATCH BOOT L-zero RPC-M4LS firmware version 1.00A to 1.20A, and Signage Rebooter RPC-M4HSi firmware version 1.00A), PoE Rebooter(PoE BOOT nino PoE8M2 firmware version 1.00A to 1.20A), Scheduler(TIME BOOT mini RSC-MT4H [End of Sale] all firmware versions, TIME BOOT RSC-MT8F [End of Sale] all firmware versions, TIME BOOT RSC-MT8FP [End of Sale] all firmware versions, TIME BOOT mini RSC-MT4HS firmware version 1.00A to 1.10A, and TIME BOOT RSC-MT8FS firmware version 1.00A to 1.00E), and Contact Converter(POSE SE10-8A7B1 firmware version 1.00A to 1.20A) allows a remote attacker with the administrative privilege to inject an arbitrary script via unspecified vectors.
References
Link Resource
https://jvn.jp/en/jp/JVN58266015/index.html Third Party Advisory
https://www.meikyo.co.jp/vln/ Patch Vendor Advisory
https://jvn.jp/en/jp/JVN58266015/index.html Third Party Advisory
https://www.meikyo.co.jp/vln/ Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_nino_rpc-m2c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_nino_rpc-m2c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_light_rpc-m5c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_light_rpc-m5c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_l-zero_rpc-m4l_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_l-zero_rpc-m4l:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_mini_rpc-m4h_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_mini_rpc-m4h:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_nino_rpc-m2cs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_nino_rpc-m2cs:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_light_rpc-m5cs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_light_rpc-m5cs:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:meikyo:watch_boot_l-zero_rpc-m4ls_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:watch_boot_l-zero_rpc-m4ls:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:meikyo:signage_rebooter_rpc-m4hsi_firmware:1.00a:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:signage_rebooter_rpc-m4hsi:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:meikyo:poe_boot_nino_poe8m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:poe_boot_nino_poe8m2:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:meikyo:time_boot_mini_rsc-mt4h_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:time_boot_mini_rsc-mt4h:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:meikyo:time_boot_rsc-mt8f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:time_boot_rsc-mt8f:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:meikyo:time_boot_rsc-mt8fp_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:time_boot_rsc-mt8fp:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:meikyo:time_boot_mini_rsc-mt4hs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:time_boot_mini_rsc-mt4hs:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:meikyo:time_boot_rsc-mt8fs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:time_boot_rsc-mt8fs:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
OR cpe:2.3:o:meikyo:pose_se10-8a7b1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:meikyo:pose_se10-8a7b1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:meikyo:pose_se10-8a7b1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:57

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN58266015/index.html - Third Party Advisory () https://jvn.jp/en/jp/JVN58266015/index.html - Third Party Advisory
References () https://www.meikyo.co.jp/vln/ - Patch, Vendor Advisory () https://www.meikyo.co.jp/vln/ - Patch, Vendor Advisory

Information

Published : 2022-05-18 15:15

Updated : 2024-11-21 06:57


NVD link : CVE-2022-28717

Mitre link : CVE-2022-28717

CVE.ORG link : CVE-2022-28717


JSON object : View

Products Affected

meikyo

  • watch_boot_nino_rpc-m2c
  • signage_rebooter_rpc-m4hsi
  • pose_se10-8a7b1
  • time_boot_mini_rsc-mt4hs
  • watch_boot_nino_rpc-m2cs_firmware
  • time_boot_rsc-mt8fs_firmware
  • pose_se10-8a7b1_firmware
  • time_boot_rsc-mt8f_firmware
  • watch_boot_light_rpc-m5cs_firmware
  • time_boot_rsc-mt8fp_firmware
  • time_boot_mini_rsc-mt4h
  • time_boot_mini_rsc-mt4h_firmware
  • signage_rebooter_rpc-m4hsi_firmware
  • watch_boot_nino_rpc-m2cs
  • poe_boot_nino_poe8m2_firmware
  • watch_boot_light_rpc-m5c
  • time_boot_rsc-mt8fp
  • poe_boot_nino_poe8m2
  • time_boot_rsc-mt8fs
  • watch_boot_l-zero_rpc-m4ls
  • time_boot_rsc-mt8f
  • watch_boot_mini_rpc-m4h
  • watch_boot_l-zero_rpc-m4l_firmware
  • watch_boot_l-zero_rpc-m4l
  • watch_boot_light_rpc-m5cs
  • time_boot_mini_rsc-mt4hs_firmware
  • watch_boot_l-zero_rpc-m4ls_firmware
  • watch_boot_nino_rpc-m2c_firmware
  • watch_boot_light_rpc-m5c_firmware
  • watch_boot_mini_rpc-m4h_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')