Elcomplus SmartICS v2.3.4.0 does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters.
Fixes

Solution

Elcomplus has released Version 2.4 to address these vulnerabilities and recommends users update to the newest version. Users can obtain the new version on request on the official SmartICS website https://smartics.io/


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:51:46.939Z

Reserved: 2022-06-20T00:00:00.000Z

Link: CVE-2022-2140

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.252Z

cve-icon NVD

Status : Modified

Published: 2022-06-27T17:15:09.317

Modified: 2024-11-21T07:00:24.717

Link: CVE-2022-2140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.