to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Moxa
Subscribe
|
Uc-2101-lx
Subscribe
Uc-2101-lx Firmware
Subscribe
Uc-2102-lx
Subscribe
Uc-2102-lx Firmware
Subscribe
Uc-2104-lx
Subscribe
Uc-2104-lx Firmware
Subscribe
Uc-2111-lx
Subscribe
Uc-2111-lx Firmware
Subscribe
Uc-2112-lx
Subscribe
Uc-2112-lx Firmware
Subscribe
Uc-2114-t-lx
Subscribe
Uc-2114-t-lx Firmware
Subscribe
Uc-2116-t-lx
Subscribe
Uc-2116-t-lx Firmware
Subscribe
Uc-3101-t-ap-lx
Subscribe
Uc-3101-t-ap-lx Firmware
Subscribe
Uc-3101-t-eu-lx
Subscribe
Uc-3101-t-eu-lx Firmware
Subscribe
Uc-3101-t-us-lx
Subscribe
Uc-3101-t-us-lx Firmware
Subscribe
Uc-3111-t-ap-lx
Subscribe
Uc-3111-t-ap-lx-nw
Subscribe
Uc-3111-t-ap-lx-nw Firmware
Subscribe
Uc-3111-t-ap-lx Firmware
Subscribe
Uc-3111-t-eu-lx
Subscribe
Uc-3111-t-eu-lx-nw
Subscribe
Uc-3111-t-eu-lx-nw Firmware
Subscribe
Uc-3111-t-eu-lx Firmware
Subscribe
Uc-3111-t-us-lx
Subscribe
Uc-3111-t-us-lx-nw
Subscribe
Uc-3111-t-us-lx-nw Firmware
Subscribe
Uc-3111-t-us-lx Firmware
Subscribe
Uc-3121-t-ap-lx
Subscribe
Uc-3121-t-ap-lx Firmware
Subscribe
Uc-3121-t-eu-lx
Subscribe
Uc-3121-t-eu-lx Firmware
Subscribe
Uc-3121-t-us-lx
Subscribe
Uc-3121-t-us-lx Firmware
Subscribe
Uc-5101-lx
Subscribe
Uc-5101-lx Firmware
Subscribe
Uc-5101-t-lx
Subscribe
Uc-5101-t-lx Firmware
Subscribe
Uc-5102-lx
Subscribe
Uc-5102-lx Firmware
Subscribe
Uc-5102-t-lx
Subscribe
Uc-5102-t-lx Firmware
Subscribe
Uc-5111-lx
Subscribe
Uc-5111-lx Firmware
Subscribe
Uc-5111-t-lx
Subscribe
Uc-5111-t-lx Firmware
Subscribe
Uc-5112-lx
Subscribe
Uc-5112-lx Firmware
Subscribe
Uc-5112-t-lx
Subscribe
Uc-5112-t-lx Firmware
Subscribe
Uc-8112-lx
Subscribe
Uc-8112-lx Firmware
Subscribe
Uc-8112a-me-t-lx
Subscribe
Uc-8112a-me-t-lx Firmware
Subscribe
Uc-8131-lx
Subscribe
Uc-8131-lx Firmware
Subscribe
Uc-8132-lx
Subscribe
Uc-8132-lx Firmware
Subscribe
Uc-8162-lx
Subscribe
Uc-8162-lx Firmware
Subscribe
Uc-8210-t-lx-s
Subscribe
Uc-8210-t-lx-s Firmware
Subscribe
Uc-8220-t-lx
Subscribe
Uc-8220-t-lx-ap-s
Subscribe
Uc-8220-t-lx-ap-s Firmware
Subscribe
Uc-8220-t-lx-eu-s
Subscribe
Uc-8220-t-lx-eu-s Firmware
Subscribe
Uc-8220-t-lx-us-s
Subscribe
Uc-8220-t-lx-us-s Firmware
Subscribe
Uc-8220-t-lx Firmware
Subscribe
Uc-8410a-lx
Subscribe
Uc-8410a-lx Firmware
Subscribe
Uc-8410a-nw-lx
Subscribe
Uc-8410a-nw-lx Firmware
Subscribe
Uc-8410a-nw-t-lx
Subscribe
Uc-8410a-nw-t-lx Firmware
Subscribe
Uc-8410a-t-lx
Subscribe
Uc-8410a-t-lx Firmware
Subscribe
Uc-8540-lx
Subscribe
Uc-8540-lx Firmware
Subscribe
Uc-8540-t-ct-lx
Subscribe
Uc-8540-t-ct-lx Firmware
Subscribe
Uc-8540-t-lx
Subscribe
Uc-8540-t-lx Firmware
Subscribe
Uc-8580-lx
Subscribe
Uc-8580-lx Firmware
Subscribe
Uc-8580-q-lx
Subscribe
Uc-8580-q-lx Firmware
Subscribe
Uc-8580-t-ct-lx
Subscribe
Uc-8580-t-ct-lx Firmware
Subscribe
Uc-8580-t-ct-q-lx
Subscribe
Uc-8580-t-ct-q-lx Firmware
Subscribe
Uc-8580-t-lx
Subscribe
Uc-8580-t-lx Firmware
Subscribe
Uc-8580-t-q-lx
Subscribe
Uc-8580-t-q-lx Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42515 | Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. |
Solution
Cradlepoint recommends users to update to at least version: * NCOS v7.22.70 NCOS release 7.1.0 and greater are no longer available for manual or offline download and are performed via the NetCloud Manager, which requires a subscription. For more information and NCOS upgrade best practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ . For more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02 |
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:42:11.399Z
Reserved: 2022-09-01T00:00:00.000Z
Link: CVE-2022-3086
Updated: 2024-08-03T01:00:10.222Z
Status : Modified
Published: 2022-12-02T20:15:13.767
Modified: 2024-11-21T07:18:47.650
Link: CVE-2022-3086
No data.
OpenCVE Enrichment
No data.
EUVD