CVE-2022-34823

Buffer overflow vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*

History

09 Nov 2022, 16:30

Type Values Removed Values Added
CPE cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Nec expresscluster X
Nec
Nec expresscluster X Singleserversafe
References (MISC) https://jpn.nec.com/security-info/secinfo/nv22-014_en.html - (MISC) https://jpn.nec.com/security-info/secinfo/nv22-014_en.html - Vendor Advisory

08 Nov 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-08 22:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-34823

Mitre link : CVE-2022-34823

CVE.ORG link : CVE-2022-34823


JSON object : View

Products Affected

nec

  • expresscluster_x
  • expresscluster_x_singleserversafe
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')