{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T06:25:26.803","vulnerabilities":[{"cve":{"id":"CVE-2022-32959","sourceIdentifier":"twcert@cert.org.tw","published":"2022-07-20T02:15:07.717","lastModified":"2024-11-21T07:07:18.783","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for OS information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service."},{"lang":"es","value":"El componente de certificado digital ciudadano del lado del cliente de HiCOS presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria cuando lee la tarjeta IC debido a una comprobación insuficiente de la longitud de los parámetros para la información del Sistema Operativo. Un atacante físico no autenticado puede explotar esta vulnerabilidad para ejecutar código arbitrario, manipular datos del sistema o terminar el servicio"}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*","matchCriteriaId":"2C3A74A9-114E-4326-B71C-83FFA3580E63"},{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*","matchCriteriaId":"7800A8CE-C635-4E00-8BEA-E3E4D4EC9378"},{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*","matchCriteriaId":"48F1D51B-28F3-4952-BB19-9BCA637DF577"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6290-738fe-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-6290-738fe-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}