Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24680 | The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server. |
Solution
Cambium Networks recommends affected users apply one of the following upgrade packages: 3.0.3-r32 2.4.2-r29 3.0.0-r34 The security patches are available from Cambium Networks support (login required). For users of cnMaestro Cloud, these vulnerabilities have been patched by Cambium Networks and no further action is required.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-04 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:20:28.857Z
Reserved: 2022-04-14T00:00:00.000Z
Link: CVE-2022-1359
Updated: 2024-08-03T00:03:05.994Z
Status : Modified
Published: 2022-05-17T21:15:08.040
Modified: 2024-11-21T06:40:34.137
Link: CVE-2022-1359
No data.
OpenCVE Enrichment
No data.
EUVD