An issue was discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16, allows authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell.
References
Link | Resource |
---|---|
https://www.gruppotim.it/it/footer/red-team.html | Third Party Advisory |
https://www.gruppotim.it/it/footer/red-team.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory |
11 Dec 2023, 15:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ericsson
Ericsson evolved Packet Gateway |
|
References | () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:ericsson:evolved_packet_gateway:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
05 Dec 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-05 06:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-47531
Mitre link : CVE-2022-47531
CVE.ORG link : CVE-2022-47531
JSON object : View
Products Affected
ericsson
- evolved_packet_gateway
CWE