CVE-2022-36310
moderate-risk
Published 2022-08-16
Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models.
Do I need to act?
-
0.95% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Airvelocity 1500 Firmware
Affected Vendors
References (4)
Permissions Required
https://helpdesk.airspan.com/browse/TRN3-1689
Permissions Required
https://helpdesk.airspan.com/browse/TRN3-1689
38
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal