The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24678 The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
Fixes

Solution

Cambium Networks recommends affected users apply one of the following upgrade packages: 3.0.3-r32 2.4.2-r29 3.0.0-r34 The security patches are available from Cambium Networks support (login required). For users of cnMaestro Cloud, these vulnerabilities have been patched by Cambium Networks and no further action is required.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:20:45.656Z

Reserved: 2022-04-14T00:00:00.000Z

Link: CVE-2022-1357

cve-icon Vulnrichment

Updated: 2024-08-03T00:03:05.783Z

cve-icon NVD

Status : Modified

Published: 2022-05-17T21:15:07.920

Modified: 2024-11-21T06:40:33.893

Link: CVE-2022-1357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.