{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:44:13.322","vulnerabilities":[{"cve":{"id":"CVE-2022-22518","sourceIdentifier":"info@cert.vde.com","published":"2022-04-07T19:15:08.357","lastModified":"2024-11-21T06:46:56.580","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy."},{"lang":"es","value":"Un error en el componente CmpUserMgr puede conllevar a una aplicación parcial de las políticas de seguridad. Esto puede resultar en un acceso habilitado y anónimo a componentes que forman parte de la política de seguridad aplicada"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"B6EFFE98-C633-4C31-9FDA-F88C4CE7A04B"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"6492A42C-B284-4981-9DA0-6CCDA56987FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"471215BE-80E8-4191-BD3A-863E62FDD021"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"0C97B5A4-BCA2-4B0F-9A06-676F0AA0D55A"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"E50B1160-AC34-435E-8761-92AD66CC20BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"EC0DF7A9-11CA-4622-8C9F-89AB063E26D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"1320EE2C-DE77-4E23-A7C6-0579886C83B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"D57C6EB7-AF27-4FEF-9202-4235D28CEA9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.0.0","versionEndExcluding":"4.5.0.0","matchCriteriaId":"96A593C8-0EFE-46F1-B80C-F2FB909FC890"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.17.0","versionEndExcluding":"3.5.18.0","matchCriteriaId":"D9D653AF-79DA-4975-973D-1054069A5D13"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17092&token=a556b1695843bb42084dc63d5bdf553ca02ea393&download=","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17092&token=a556b1695843bb42084dc63d5bdf553ca02ea393&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}