{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:12:43.821","vulnerabilities":[{"cve":{"id":"CVE-2022-32960","sourceIdentifier":"twcert@cert.org.tw","published":"2022-07-20T02:15:07.827","lastModified":"2024-11-21T07:07:18.927","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service."},{"lang":"es","value":"El componente de certificado digital ciudadano del lado del cliente de HiCOS presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria cuando lee la tarjeta IC debido a una comprobación insuficiente de la longitud de los parámetros para el número de la tarjeta. Un atacante físico no autenticado puede explotar esta vulnerabilidad para ejecutar código arbitrario, manipular datos del sistema o interrumpir el servicio"}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*","matchCriteriaId":"2C3A74A9-114E-4326-B71C-83FFA3580E63"},{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*","matchCriteriaId":"7800A8CE-C635-4E00-8BEA-E3E4D4EC9378"},{"vulnerable":true,"criteria":"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*","matchCriteriaId":"48F1D51B-28F3-4952-BB19-9BCA637DF577"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6291-f58b5-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-6291-f58b5-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}