CVE-2022-3086

Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:uc-8580-t-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:moxa:uc-8580-q-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:moxa:uc-8580-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:moxa:uc-8540-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:moxa:uc-8540-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:moxa:uc-8410a-lx_firmware:2.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:2.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:2.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:2.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
OR cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
OR cpe:2.3:o:moxa:uc-8131-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8131-lx_firmware:1.3:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
OR cpe:2.3:o:moxa:uc-8132-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8132-lx_firmware:1.3:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
OR cpe:2.3:o:moxa:uc-8162-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8162-lx_firmware:1.3:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
OR cpe:2.3:o:moxa:uc-8112-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8112-lx_firmware:1.3:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:moxa:uc-5101-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:moxa:uc-5101-t-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:moxa:uc-5102-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:moxa:uc-5102-t-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:moxa:uc-5111-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:moxa:uc-5111-t-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:moxa:uc-5112-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:moxa:uc-5112-t-lx_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*

Configuration 39 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*

Configuration 40 (hide)

AND
cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*

Configuration 41 (hide)

AND
cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*

Configuration 42 (hide)

AND
cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*

Configuration 43 (hide)

AND
cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*

Configuration 44 (hide)

AND
cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*

Configuration 45 (hide)

AND
cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*

Configuration 46 (hide)

AND
cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*

Configuration 47 (hide)

AND
cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*

Configuration 48 (hide)

AND
cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*

Configuration 49 (hide)

AND
cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*

Configuration 50 (hide)

AND
cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*

Configuration 51 (hide)

AND
cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:50

Type Values Removed Values Added
Summary Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.

Information

Published : 2022-12-02 20:15

Updated : 2024-02-28 19:51


NVD link : CVE-2022-3086

Mitre link : CVE-2022-3086

CVE.ORG link : CVE-2022-3086


JSON object : View

Products Affected

moxa

  • uc-5111-lx_firmware
  • uc-8580-t-ct-lx_firmware
  • uc-8580-t-ct-q-lx_firmware
  • uc-8220-t-lx_firmware
  • uc-8580-lx_firmware
  • uc-8220-t-lx-eu-s
  • uc-5112-lx_firmware
  • uc-3101-t-eu-lx
  • uc-5112-t-lx
  • uc-5101-t-lx_firmware
  • uc-8220-t-lx-ap-s_firmware
  • uc-5102-t-lx
  • uc-2102-lx
  • uc-2111-lx_firmware
  • uc-3101-t-eu-lx_firmware
  • uc-8540-t-lx
  • uc-8162-lx_firmware
  • uc-8410a-nw-lx
  • uc-8112-lx
  • uc-5101-lx
  • uc-5102-t-lx_firmware
  • uc-8410a-lx
  • uc-3111-t-us-lx-nw_firmware
  • uc-3111-t-ap-lx-nw_firmware
  • uc-2114-t-lx
  • uc-3101-t-ap-lx
  • uc-2111-lx
  • uc-3111-t-us-lx
  • uc-8112a-me-t-lx_firmware
  • uc-2101-lx_firmware
  • uc-8132-lx_firmware
  • uc-3121-t-ap-lx
  • uc-2102-lx_firmware
  • uc-2116-t-lx_firmware
  • uc-8220-t-lx
  • uc-8210-t-lx-s_firmware
  • uc-8131-lx_firmware
  • uc-8580-t-q-lx
  • uc-8580-lx
  • uc-8131-lx
  • uc-3111-t-eu-lx_firmware
  • uc-8410a-t-lx
  • uc-8132-lx
  • uc-3111-t-ap-lx-nw
  • uc-8580-t-ct-lx
  • uc-5111-lx
  • uc-3111-t-eu-lx
  • uc-2112-lx
  • uc-5111-t-lx
  • uc-5111-t-lx_firmware
  • uc-8112-lx_firmware
  • uc-8410a-nw-t-lx_firmware
  • uc-8112a-me-t-lx
  • uc-8540-t-ct-lx
  • uc-8580-q-lx_firmware
  • uc-8540-lx
  • uc-5102-lx_firmware
  • uc-5112-lx
  • uc-3121-t-eu-lx
  • uc-8220-t-lx-us-s
  • uc-8580-q-lx
  • uc-8410a-t-lx_firmware
  • uc-3121-t-ap-lx_firmware
  • uc-3111-t-ap-lx
  • uc-5112-t-lx_firmware
  • uc-8540-lx_firmware
  • uc-5101-t-lx
  • uc-8162-lx
  • uc-3111-t-us-lx_firmware
  • uc-8220-t-lx-eu-s_firmware
  • uc-3121-t-eu-lx_firmware
  • uc-2104-lx_firmware
  • uc-3101-t-ap-lx_firmware
  • uc-3111-t-eu-lx-nw
  • uc-8580-t-lx
  • uc-8410a-nw-t-lx
  • uc-2101-lx
  • uc-3111-t-us-lx-nw
  • uc-3101-t-us-lx
  • uc-3121-t-us-lx_firmware
  • uc-8410a-lx_firmware
  • uc-8540-t-ct-lx_firmware
  • uc-3111-t-ap-lx_firmware
  • uc-8580-t-ct-q-lx
  • uc-8210-t-lx-s
  • uc-3101-t-us-lx_firmware
  • uc-2116-t-lx
  • uc-8540-t-lx_firmware
  • uc-2104-lx
  • uc-3111-t-eu-lx-nw_firmware
  • uc-8410a-nw-lx_firmware
  • uc-8220-t-lx-us-s_firmware
  • uc-8220-t-lx-ap-s
  • uc-5101-lx_firmware
  • uc-2112-lx_firmware
  • uc-8580-t-q-lx_firmware
  • uc-3121-t-us-lx
  • uc-5102-lx
  • uc-8580-t-lx_firmware
  • uc-2114-t-lx_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')