No analysis available yet.
Vendor Workaround
As of July 18th, 2022, MiCODUS has not provided updates or patches to mitigate these vulnerabilities. CISA will update the corresponding ICSA to reflect any patches, updates, or mitigation information provided by MiCODUS in the future.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-36980 | The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object references vulnerability on endpoint and POST parameter “Device ID,” which accepts arbitrary device IDs. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:14:59.125Z
Reserved: 2022-06-24T00:00:00.000Z
Link: CVE-2022-33944
Updated: 2024-08-03T08:16:15.920Z
Status : Modified
Published: 2022-07-20T16:15:09.160
Modified: 2024-11-21T07:08:39.380
Link: CVE-2022-33944
No data.
OpenCVE Enrichment
No data.
EUVD