CVE-2021-22646
moderate-risk
Published 2022-07-28
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
Do I need to act?
-
0.99% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (8)
Twinsoft
Tbox Lt2-530 Firmware
Tbox Lt2-532 Firmware
Tbox Lt2-540 Firmware
Tbox Ms-Cpu32 Firmware
Tbox Ms-Cpu32-S2 Firmware
Tbox Rm2 Firmware
Tbox Tg2 Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-054-04
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-054-04
47
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
14/34 · Moderate