{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T18:08:00.060","vulnerabilities":[{"cve":{"id":"CVE-2022-41667","sourceIdentifier":"cybersecurity@se.com","published":"2022-11-04T12:15:19.153","lastModified":"2024-11-21T07:23:36.180","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior)."},{"lang":"es","value":"Existe una vulnerabilidad CWE-22: Limitación Inadecuada de un Nombre de Ruta a un Directorio Restringido (\"Path Traversal\") que permite a adversarios con privilegios de usuario local cargar una DLL maliciosa que podría conducir a la ejecución de código malicioso. Productos afectados: EcoStruxure Operator Terminal Expert (V3.3 Hotfix 1 o anterior), Pro-face BLUE (V3.3 Hotfix 1 o anterior)."}],"metrics":{"cvssMetricV31":[{"source":"cybersecurity@se.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"cybersecurity@se.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3","matchCriteriaId":"5705916B-E189-4314-AD32-C8D42991DFA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:*:*:*:*:*:*:*","matchCriteriaId":"5585436E-9363-4730-9AF5-CE705093E664"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:hf1:*:*:*:*:*:*","matchCriteriaId":"1495D2CA-263C-4B9F-9C4F-A1DCA574743E"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:pro-face_blue:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3","matchCriteriaId":"297C4149-AA1F-4033-BD74-0FB908783399"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:*:*:*:*:*:*:*","matchCriteriaId":"5B593005-BB3F-439A-AF38-F31AFEF6FCB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:hf1:*:*:*:*:*:*","matchCriteriaId":"D3D36B2C-AA16-4E42-90AF-DE40D6527D23"}]}]}],"references":[{"url":"https://www.se.com/ww/en/download/document/SEVD-2022-284-01/","source":"cybersecurity@se.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.se.com/ww/en/download/document/SEVD-2022-284-01/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}