Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-28096 | The absence of filters when loading some sections in the web application of the vulnerable device allows attackers to inject malicious code that will be interpreted when a legitimate user accesses the specific web section where the information is displayed. Injection can be done on specific parameters. The injected code is executed when a legitimate user attempts to review history. |
Solution
IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01 |
![]() ![]() |
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T18:00:18.257Z
Reserved: 2022-02-15T00:00:00.000Z
Link: CVE-2022-22985

Updated: 2024-08-03T03:28:42.832Z

Status : Modified
Published: 2022-03-10T17:45:43.893
Modified: 2024-11-21T06:47:44.610
Link: CVE-2022-22985

No data.

No data.