CVE-2022-46140
high-risk
Published 2022-12-13
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
Do I need to act?
-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Ruggedcom Rm1224 Lte\(4G\) Eu Firmware
Ruggedcom Rm1224 Lte\(4G\) Nam Firmware
Scalance M804Pb Firmware
Scalance M812-1 Adsl-Router Firmware
Scalance M816-1 Adsl-Router Firmware
Scalance M826-2 Shdsl-Router Firmware
Scalance M874-2 Firmware
Scalance M874-3 Firmware
Scalance M876-3 Firmware
Scalance M876-4 Firmware
Scalance Mum853-1 Firmware
Scalance Mum856-1 Firmware
Scalance S615 Eec Firmware
Scalance Sc622-2C Firmware
Scalance Sc626-2C Firmware
Scalance Sc632-2C Firmware
Scalance Sc636-2C Firmware
Scalance Sc642-2C Firmware
Scalance Sc646-2C Firmware
Affected Vendors
References (3)
54
/ 100
high-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
30/34 · Critical