to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
No analysis available yet.
Vendor Solution
Cradlepoint recommends users to update to at least version: * NCOS v7.22.70 NCOS release 7.1.0 and greater are no longer available for manual or offline download and are performed via the NetCloud Manager, which requires a subscription. For more information and NCOS upgrade best practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ . For more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42515 | Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02 |
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:42:11.399Z
Reserved: 2022-09-01T00:00:00.000Z
Link: CVE-2022-3086
Updated: 2024-08-03T01:00:10.222Z
Status : Modified
Published: 2022-12-02T20:15:13.767
Modified: 2024-11-21T07:18:47.650
Link: CVE-2022-3086
No data.
OpenCVE Enrichment
No data.
EUVD