CVE-2022-36306

An authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:airspan:airvelocity_1500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airspan:airvelocity_1500:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
References () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 - Exploit, Third Party Advisory () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9 - Exploit, Third Party Advisory
References () https://helpdesk.airspan.com/browse/TRN3-1691 - Permissions Required, Vendor Advisory () https://helpdesk.airspan.com/browse/TRN3-1691 - Permissions Required, Vendor Advisory

Information

Published : 2022-08-16 01:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-36306

Mitre link : CVE-2022-36306

CVE.ORG link : CVE-2022-36306


JSON object : View

Products Affected

airspan

  • airvelocity_1500
  • airvelocity_1500_firmware
CWE
CWE-219

Storage of File with Sensitive Data Under Web Root

CWE-552

Files or Directories Accessible to External Parties