Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Users should take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolate them from business networks. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-07 |
![]() ![]() |
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:50:46.946Z
Reserved: 2022-08-04T00:00:00.000Z
Link: CVE-2022-2662

Updated: 2024-08-03T00:46:03.638Z

Status : Modified
Published: 2022-08-16T21:15:09.783
Modified: 2024-11-21T07:01:28.020
Link: CVE-2022-2662

No data.

No data.