Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2022-31749", "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "state": "PUBLISHED", "assignerShortName": "rapid7", "dateReserved": "2022-05-26T17:58:55.663Z", "datePublished": "2025-01-27T23:28:40.596Z", "dateUpdated": "2025-01-28T15:18:35.068Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Fireware OS", "vendor": "WatchGuard", "versions": [{"lessThan": "12.8.1", "status": "affected", "version": "0", "versionType": "custom"}, {"lessThan": "12.1.4", "status": "affected", "version": "12.x", "versionType": "custom"}, {"lessThan": "12.5.x", "status": "affected", "version": "12.2.x", "versionType": "custom"}, {"status": "affected", "version": "12.5.10", "versionType": "custom"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Jake Baines, Rapid7"}], "datePublic": "2022-06-23T16:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(248, 248, 248);\">An argument injection vulnerability in the </span><tt><span style=\"background-color: rgb(248, 248, 248);\">diagnose</span></tt><span style=\"background-color: rgb(248, 248, 248);\"> and </span><tt><span style=\"background-color: rgb(248, 248, 248);\">import pac</span></tt><span style=\"background-color: rgb(248, 248, 248);\"> commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows <span style=\"background-color: rgb(255, 255, 255);\">an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances</span></span><br>"}], "value": "An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances"}], "impacts": [{"capecId": "CAPEC-6", "descriptions": [{"lang": "en", "value": "CAPEC-6 Argument Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7", "dateUpdated": "2025-01-27T23:29:05.736Z"}, "references": [{"url": "https://www.rapid7.com/blog/post/2022/06/23/cve-2022-31749-watchguard-authenticated-arbitrary-file-read-write-fixed/"}, {"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00019"}], "source": {"discovery": "EXTERNAL"}, "title": "Authenticated arbitrary file read/write in WatchGuard Fireware OS", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-01-28T15:09:59.502452Z", "id": "CVE-2022-31749", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-01-28T15:18:35.068Z"}}]}}