{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:38:53.234","vulnerabilities":[{"cve":{"id":"CVE-2022-31887","sourceIdentifier":"cve@mitre.org","published":"2022-06-28T22:15:08.257","lastModified":"2024-11-21T07:05:26.417","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password."},{"lang":"es","value":"Marval MSM versión v14.19.0.12476, presenta una vulnerabilidad de Adquisición de Cuentas con 0 Clics, que permite a un atacante cambiar la contraseña de cualquier usuario de la organización, esto significa que el usuario también puede escalar lograr una Escalada de Privilegios al cambiar la contraseña del administrador"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:marvalglobal:marval_msm:14.19.0.12476:*:*:*:*:*:*:*","matchCriteriaId":"AA4B7AB4-8F32-4843-B842-9D013552C647"}]}]}],"references":[{"url":"https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://drive.google.com/drive/folders/12nb9KvckzhUNv4RtjlaeZi8QeFqwvkMX?usp=sharing","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"]},{"url":"https://marvalglobal.com/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://drive.google.com/drive/folders/12nb9KvckzhUNv4RtjlaeZi8QeFqwvkMX?usp=sharing","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"https://marvalglobal.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}