{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:05:33.428","vulnerabilities":[{"cve":{"id":"CVE-2022-24388","sourceIdentifier":"security@fidelissecurity.com","published":"2022-05-17T20:15:08.293","lastModified":"2024-11-21T06:50:19.013","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in rconfig “date” enables an attacker with user level access to the CLI to inject root level commands into Fidelis Network and Deception CommandPost, Collector, Sensor, and Sandbox components as well as neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability."},{"lang":"es","value":"Una vulnerabilidad en rconfig \"date\" permite a un atacante con acceso de nivel de usuario a la CLI inyectar comandos de nivel root en los componentes CommandPost, Collector, Sensor y Sandbox de Fidelis Network y Deception, así como en los componentes vecinos de Fidelis. La vulnerabilidad está presente en Fidelis Network y Deception versiones anteriores a 9.4.5. Se presentan parches y actualizaciones disponibles para abordar esta vulnerabilidad"}],"metrics":{"cvssMetricV31":[{"source":"security@fidelissecurity.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@fidelissecurity.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fidelissecurity:deception:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.5","matchCriteriaId":"B47023FD-5C7C-4A2C-BFF7-7800FB6A33FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fidelissecurity:network:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.5","matchCriteriaId":"3AF6ED2D-5AB3-4D21-AF34-9F0F517C46DD"}]}]}],"references":[{"url":"https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411","source":"security@fidelissecurity.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]}]}}]}