8.8 CVE-2022-4621

CSRF

 

Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are vulnerable to CSRFs that can be exploited to allow an attacker to perform changes with administrator level privileges.
https://nvd.nist.gov/vuln/detail/CVE-2022-4621

Categories

CWE-352 : Cross-Site Request Forgery (CSRF)
When a web server is designed to receive a request from a client without any mechanism for verifying that it was intentionally sent, then it might be possible for an attacker to trick a client into making an unintentional request to the web server which will be treated as an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can result in exposure of data or unintended code execution.

References


 

CPE

cpe start end
Configuration 1
   cpe:2.3:o:panasonic:vcc-hd5600p_firmware:2.03-06:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:panasonic:vcc-hd5600p:-:*:*:*:*:*:*:*
Configuration 2
   cpe:2.3:o:panasonic:vcc-hd3300p_firmware:1.02-05:*:*:*:*:*:*:*
   cpe:2.3:o:panasonic:vcc-hd3300p_firmware:2.03-08:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:panasonic:vcc-hd3300p:-:*:*:*:*:*:*:*
Configuration 3
   cpe:2.3:o:panasonic:vcc-hd3300_firmware:2.03-02:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:panasonic:vcc-hd3300:-:*:*:*:*:*:*:*
Configuration 4
   cpe:2.3:o:panasonic:vcc-hd2100p_firmware:2.03-02:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:panasonic:vcc-hd2100p:-:*:*:*:*:*:*:*
Configuration 5
   cpe:2.3:o:panasonic:vcc-hd3100p_firmware:2.03-00:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:panasonic:vcc-hd3100p:-:*:*:*:*:*:*:*

Exploits

Exploit-db.com
id description date
No known exploits
Other (github, ...)
Url
No known exploits

CAPEC

id description severity
111 JSON Hijacking (aka JavaScript Hijacking)
High
62 Cross Site Request Forgery
Very High
467 Cross Site Identification
Low
462 Cross-Domain Search Timing
Medium

Sherlock® flash

Take a picture of your computer network in a few clicks !

The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.

Discover this offer

Sherlock® flash: 1st instant cybersecurity audit solution