{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T11:20:09.646","vulnerabilities":[{"cve":{"id":"CVE-2022-4312","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2022-12-12T18:15:13.393","lastModified":"2024-11-21T07:35:00.633","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nA cleartext storage of sensitive information vulnerability exists in PcVue versions 8.10 through 15.2.3. This could\nallow an unauthorized user with access the email and short messaging service (SMS) accounts configuration files\nto discover the associated simple mail transfer protocol (SMTP) account credentials and the SIM card PIN code.\nSuccessful exploitation of this vulnerability could allow an unauthorized user access to the underlying email\naccount and SIM card.\n\n"},{"lang":"es","value":"Existe una vulnerabilidad de almacenamiento en texto plano de información confidencial en las versiones de PcVue 8.10 a 15.2.3. Esto podría permitir que un usuario no autorizado con acceso a los archivos de configuración de las cuentas de correo electrónico y servicio de mensajería corta (SMS) descubra las credenciales de la cuenta del protocolo simple de transferencia de correo (SMTP) asociadas y el código PIN de la tarjeta SIM. La explotación exitosa de esta vulnerabilidad podría permitir que un usuario no autorizado acceda a la cuenta de correo electrónico y a la tarjeta SIM subyacentes."}],"metrics":{"cvssMetricV31":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-312"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arcinformatique:pcvue:*:*:*:*:*:*:*:*","versionStartIncluding":"8.10","versionEndIncluding":"15.2.3","matchCriteriaId":"17CE5F0F-3966-4F8C-A871-11EBA1FA62F1"}]}]}],"references":[{"url":"https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1171-security-bulletin-2022-7","source":"ics-cert@hq.dhs.gov","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1171-security-bulletin-2022-7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]}]}}]}