CVE-2022-33175

Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 have an insecure permissions setting on the user.token field that is accessible to everyone through the /cgi/get_param.cgi HTTP API. This leads to disclosing active session ids of currently logged-in administrators. The session id can then be reused to act as the administrator, allowing reading of the cleartext password, or reconfiguring the device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 56%
VendorProductVersion
powertekpdusbasic_pdu_firmware
𝑥
< 3.30.30
powertekpduspm_pdu_firmware
𝑥
< 3.30.30
powertekpduspiml_pdu_firmware
𝑥
< 3.30.30
powertekpdussmart_pim_firmware
𝑥
< 3.30.30
powertekpdussmart_pos_firmware
𝑥
< 3.30.30
powertekpdussmart_pom_firmware
𝑥
< 3.30.30
powertekpdussmart_poms_firmware
𝑥
< 3.30.30
𝑥
= Vulnerable software versions