{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T03:15:13.052","vulnerabilities":[{"cve":{"id":"CVE-2022-40629","sourceIdentifier":"vdisclose@cert-in.org.in","published":"2022-09-23T18:15:11.420","lastModified":"2024-11-21T07:21:44.513","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to view sensitive information on the targeted device."},{"lang":"es","value":"Esta vulnerabilidad se presenta en Tacitine Firewall, en todas las versiones de EN6200-PRIME QUAD-35 y EN6200-PRIME QUAD-100 entre 19.1.1 y 22.20.1 (incluyéndola), debido a un diseño no seguro en la interfaz de administración basada en web de Tacitine Firewall. Un atacante remoto no autenticado podría explotar esta vulnerabilidad mediante el envío de una petición http especialmente diseñada en el dispositivo objetivo. Una explotación con éxito de esta vulnerabilidad podría permitir a un atacante remoto no autenticado ver información confidencial en el dispositivo objetivo."}],"metrics":{"cvssMetricV31":[{"source":"vdisclose@cert-in.org.in","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"vdisclose@cert-in.org.in","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tacitine:en6200-prime_quad-35_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"19.1.1","versionEndExcluding":"22.21.2","matchCriteriaId":"6E36CCE1-EE57-4509-A5EA-A661AB0D28BE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tacitine:en6200-prime_quad-35:-:*:*:*:*:*:*:*","matchCriteriaId":"83F89827-7182-4C0F-8AF9-F93FECCA4DEC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tacitine:en6200-prime_quad-100_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"19.1.1","versionEndExcluding":"22.21.2","matchCriteriaId":"4EDF36CA-FC59-4CB9-B562-5E6EB2102319"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tacitine:en6200-prime_quad-100:-:*:*:*:*:*:*:*","matchCriteriaId":"2071D6CD-7708-46EC-9B09-F0BC9A1626C9"}]}]}],"references":[{"url":"https://tacitine.com/newdownload/CVE-2022-40629.pdf","source":"vdisclose@cert-in.org.in","tags":["Vendor Advisory"]},{"url":"https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363","source":"vdisclose@cert-in.org.in","tags":["Third Party Advisory"]},{"url":"https://tacitine.com/newdownload/CVE-2022-40629.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}