The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user.
Fixes

Solution

No solution given by the vendor.


Workaround

Ricon Mobile has not responded to requests to work with CISA to mitigate this vulnerability. Users of the affected products are invited to contact Ricon Mobile customer support for additional information. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from the business network. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:46:22.522Z

Reserved: 2022-01-25T00:00:00.000Z

Link: CVE-2022-0365

cve-icon Vulnrichment

Updated: 2024-08-02T23:25:40.208Z

cve-icon NVD

Status : Modified

Published: 2022-02-04T23:15:12.563

Modified: 2024-11-21T06:38:28.067

Link: CVE-2022-0365

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.