Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Foreseer EPMS", "vendor": "Eaton", "versions": [{"status": "affected", "version": "7.0"}, {"status": "affected", "version": "4.0"}]}], "credits": [{"lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Michael"}], "datePublic": "2022-12-13T12:48:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation\u2019s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. <br><br>This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. <br><br>Customers are advised to update the software to the latest version (v7.6).<br><br>Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html\">End-of-Support notification</a>."}], "value": "A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation\u2019s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. \n\nThis vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. \n\nCustomers are advised to update the software to the latest version (v7.6).\n\nForeseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please\u00a0refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html ."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "63703b7d-23e2-41ef-94b3-a3c6333f7759", "shortName": "Eaton", "dateUpdated": "2023-10-18T06:20:11.855Z"}, "references": [{"name": "https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html", "url": "https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html"}], "source": {"advisory": "ETN", "discovery": "EXTERNAL"}, "title": "Unrestricted file upload in Eaton Foreseer EPMS", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T08:09:22.695Z"}, "title": "CVE Program Container", "references": [{"name": "https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html", "url": "https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/security-notifications.html", "tags": ["x_transferred"]}]}]}, "cveMetadata": {"assignerOrgId": "63703b7d-23e2-41ef-94b3-a3c6333f7759", "cveId": "CVE-2022-33859", "serial": 1, "state": "PUBLISHED", "dateUpdated": "2024-08-03T08:09:22.695Z", "dateReserved": "2022-06-15T00:00:00", "datePublished": "2022-10-28T01:15:03.902604Z", "assignerShortName": "Eaton"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}