to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00262.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Moxa
Subscribe
|
Uc-2101-lx
Subscribe
Uc-2101-lx Firmware
Subscribe
Uc-2102-lx
Subscribe
Uc-2102-lx Firmware
Subscribe
Uc-2104-lx
Subscribe
Uc-2104-lx Firmware
Subscribe
Uc-2111-lx
Subscribe
Uc-2111-lx Firmware
Subscribe
Uc-2112-lx
Subscribe
Uc-2112-lx Firmware
Subscribe
Uc-2114-t-lx
Subscribe
Uc-2114-t-lx Firmware
Subscribe
Uc-2116-t-lx
Subscribe
Uc-2116-t-lx Firmware
Subscribe
Uc-3101-t-ap-lx
Subscribe
Uc-3101-t-ap-lx Firmware
Subscribe
Uc-3101-t-eu-lx
Subscribe
Uc-3101-t-eu-lx Firmware
Subscribe
Uc-3101-t-us-lx
Subscribe
Uc-3101-t-us-lx Firmware
Subscribe
Uc-3111-t-ap-lx
Subscribe
Uc-3111-t-ap-lx-nw
Subscribe
Uc-3111-t-ap-lx-nw Firmware
Subscribe
Uc-3111-t-ap-lx Firmware
Subscribe
Uc-3111-t-eu-lx
Subscribe
Uc-3111-t-eu-lx-nw
Subscribe
Uc-3111-t-eu-lx-nw Firmware
Subscribe
Uc-3111-t-eu-lx Firmware
Subscribe
Uc-3111-t-us-lx
Subscribe
Uc-3111-t-us-lx-nw
Subscribe
Uc-3111-t-us-lx-nw Firmware
Subscribe
Uc-3111-t-us-lx Firmware
Subscribe
Uc-3121-t-ap-lx
Subscribe
Uc-3121-t-ap-lx Firmware
Subscribe
Uc-3121-t-eu-lx
Subscribe
Uc-3121-t-eu-lx Firmware
Subscribe
Uc-3121-t-us-lx
Subscribe
Uc-3121-t-us-lx Firmware
Subscribe
Uc-5101-lx
Subscribe
Uc-5101-lx Firmware
Subscribe
Uc-5101-t-lx
Subscribe
Uc-5101-t-lx Firmware
Subscribe
Uc-5102-lx
Subscribe
Uc-5102-lx Firmware
Subscribe
Uc-5102-t-lx
Subscribe
Uc-5102-t-lx Firmware
Subscribe
Uc-5111-lx
Subscribe
Uc-5111-lx Firmware
Subscribe
Uc-5111-t-lx
Subscribe
Uc-5111-t-lx Firmware
Subscribe
Uc-5112-lx
Subscribe
Uc-5112-lx Firmware
Subscribe
Uc-5112-t-lx
Subscribe
Uc-5112-t-lx Firmware
Subscribe
Uc-8112-lx
Subscribe
Uc-8112-lx Firmware
Subscribe
Uc-8112a-me-t-lx
Subscribe
Uc-8112a-me-t-lx Firmware
Subscribe
Uc-8131-lx
Subscribe
Uc-8131-lx Firmware
Subscribe
Uc-8132-lx
Subscribe
Uc-8132-lx Firmware
Subscribe
Uc-8162-lx
Subscribe
Uc-8162-lx Firmware
Subscribe
Uc-8210-t-lx-s
Subscribe
Uc-8210-t-lx-s Firmware
Subscribe
Uc-8220-t-lx
Subscribe
Uc-8220-t-lx-ap-s
Subscribe
Uc-8220-t-lx-ap-s Firmware
Subscribe
Uc-8220-t-lx-eu-s
Subscribe
Uc-8220-t-lx-eu-s Firmware
Subscribe
Uc-8220-t-lx-us-s
Subscribe
Uc-8220-t-lx-us-s Firmware
Subscribe
Uc-8220-t-lx Firmware
Subscribe
Uc-8410a-lx
Subscribe
Uc-8410a-lx Firmware
Subscribe
Uc-8410a-nw-lx
Subscribe
Uc-8410a-nw-lx Firmware
Subscribe
Uc-8410a-nw-t-lx
Subscribe
Uc-8410a-nw-t-lx Firmware
Subscribe
Uc-8410a-t-lx
Subscribe
Uc-8410a-t-lx Firmware
Subscribe
Uc-8540-lx
Subscribe
Uc-8540-lx Firmware
Subscribe
Uc-8540-t-ct-lx
Subscribe
Uc-8540-t-ct-lx Firmware
Subscribe
Uc-8540-t-lx
Subscribe
Uc-8540-t-lx Firmware
Subscribe
Uc-8580-lx
Subscribe
Uc-8580-lx Firmware
Subscribe
Uc-8580-q-lx
Subscribe
Uc-8580-q-lx Firmware
Subscribe
Uc-8580-t-ct-lx
Subscribe
Uc-8580-t-ct-lx Firmware
Subscribe
Uc-8580-t-ct-q-lx
Subscribe
Uc-8580-t-ct-q-lx Firmware
Subscribe
Uc-8580-t-lx
Subscribe
Uc-8580-t-lx Firmware
Subscribe
Uc-8580-t-q-lx
Subscribe
Uc-8580-t-q-lx Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
Configuration 47 [-]
| AND |
|
Configuration 48 [-]
| AND |
|
Configuration 49 [-]
| AND |
|
Configuration 50 [-]
| AND |
|
Configuration 51 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42515 | Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. |
Solution
Cradlepoint recommends users to update to at least version: * NCOS v7.22.70 NCOS release 7.1.0 and greater are no longer available for manual or offline download and are performed via the NetCloud Manager, which requires a subscription. For more information and NCOS upgrade best practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ . For more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02 |
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:42:11.399Z
Reserved: 2022-09-01T00:00:00.000Z
Link: CVE-2022-3086
Updated: 2024-08-03T01:00:10.222Z
Status : Modified
Published: 2022-12-02T20:15:13.767
Modified: 2024-11-21T07:18:47.650
Link: CVE-2022-3086
No data.
OpenCVE Enrichment
No data.
EUVD