Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24677 | cnMaestro is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands. |
Solution
Cambium Networks recommends affected users apply one of the following upgrade packages: 3.0.3-r32 2.4.2-r29 3.0.0-r34 The security patches are available from Cambium Networks support (login required). For users of cnMaestro Cloud, these vulnerabilities have been patched by Cambium Networks and no further action is required.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-04 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:20:36.735Z
Reserved: 2022-04-14T00:00:00.000Z
Link: CVE-2022-1356
Updated: 2024-08-03T00:03:05.876Z
Status : Modified
Published: 2022-05-17T21:15:07.843
Modified: 2024-11-21T06:40:33.770
Link: CVE-2022-1356
No data.
OpenCVE Enrichment
No data.
EUVD