Elcomplus SmartICS v2.3.4.0 does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files.
Fixes

Solution

Elcomplus has released Version 2.4 to address these vulnerabilities and recommends users update to the newest version. Users can obtain the new version on request on the official SmartICS website https://smartics.io/


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:15:46.034Z

Reserved: 2022-06-16T00:00:00.000Z

Link: CVE-2022-2106

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.184Z

cve-icon NVD

Status : Modified

Published: 2022-06-27T17:15:09.223

Modified: 2024-11-21T07:00:19.837

Link: CVE-2022-2106

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.