{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T00:48:18.855","vulnerabilities":[{"cve":{"id":"CVE-2022-0183","sourceIdentifier":"vultures@jpcert.or.jp","published":"2022-01-17T10:15:08.200","lastModified":"2024-11-21T06:38:05.520","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Missing encryption of sensitive data vulnerability in 'MIRUPASS' PW10 firmware all versions and 'MIRUPASS' PW20 firmware all versions allows an attacker who can physically access the device to obtain the stored passwords."},{"lang":"es","value":"Una vulnerabilidad de falta de cifrado de datos confidenciales en el firmware de \"MIRUPASS\" PW10 todas las versiones y en el firmware de \"MIRUPASS\" PW20 todas las versiones permite a un atacante que pueda acceder físicamente al dispositivo obtener las contraseñas almacenadas"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-311"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kingjim:mirupass_pw10_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E9FB74D3-B6AA-415E-9864-AEC01357401F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:kingjim:mirupass_pw10:-:*:*:*:*:*:*:*","matchCriteriaId":"A965B937-4E1D-40F6-947E-816BA0B48EE8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kingjim:mirupass_pw20_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"22A8DD2F-2606-4AD5-BE79-088B3A50D30A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:kingjim:mirupass_pw20:-:*:*:*:*:*:*:*","matchCriteriaId":"00914630-3A9A-472D-8FA0-80FB046F7384"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN19826500/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.kingjim.co.jp/download/security/#mirupass","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN19826500/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.kingjim.co.jp/download/security/#mirupass","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}