{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T08:07:03.612","vulnerabilities":[{"cve":{"id":"CVE-2022-30233","sourceIdentifier":"cybersecurity@se.com","published":"2022-06-02T23:15:07.507","lastModified":"2024-11-21T07:02:25.277","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-20: Improper Input Validation vulnerability exists that could allow the product to be maliciously manipulated when the user is tricked into performing certain actions on a webpage. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)"},{"lang":"es","value":"Una CWE-20: Se presenta una vulnerabilidad de Comprobación de Entrada Inapropiada que podría permitir una manipulación maliciosa del producto cuando es engañado al usuario para que lleve a cabo determinadas acciones en una página web. Productos afectados: Wiser Smart, EER21000 y EER21001 (versiones V4.5 y anteriores)"}],"metrics":{"cvssMetricV31":[{"source":"cybersecurity@se.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"cybersecurity@se.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:wiser_smart_eer21000_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.5","matchCriteriaId":"5FF54835-9F49-417D-985F-24799D9B93A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:wiser_smart_eer21000:-:*:*:*:*:*:*:*","matchCriteriaId":"E5552670-EDA0-4C30-B292-2228FB418A38"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:wiser_smart_eer21001_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.5","matchCriteriaId":"B3E7CC55-F222-470E-AA71-DEECB4A971F6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:wiser_smart_eer21001:-:*:*:*:*:*:*:*","matchCriteriaId":"68D3AC8F-AA3E-4173-89FB-6F8EA59FA52B"}]}]}],"references":[{"url":"https://www.se.com/ww/en/download/document/SEVD-2022-130-03/","source":"cybersecurity@se.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://www.se.com/ww/en/download/document/SEVD-2022-130-03/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}