Skip to main content

CVE-2022-42141: n/a in n/a

Medium
VulnerabilityCVE-2022-42141cvecve-2022-42141n-a
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.

AI-Powered Analysis

AILast updated: 06/21/2025, 18:53:00 UTC

Technical Analysis

CVE-2022-42141 is a Cross Site Scripting (XSS) vulnerability identified in the Delta Electronics DX-2100-L1-CN device, specifically version 2.42. The vulnerability arises from improper sanitization of user-supplied input in the 'lform/urlfilter' parameter, which allows an attacker to inject malicious scripts into web pages viewed by other users. This type of vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), but requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the malicious script execution. The vulnerability impacts confidentiality and integrity by potentially allowing theft of session tokens, credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity issue. No known public exploits or patches are currently available, and the vendor or product details beyond the device model are not specified. The device in question is likely used in industrial or automation contexts, given Delta Electronics' product portfolio, which may expose operational technology environments to risk if the device is accessible via web interfaces. The vulnerability requires authenticated access and user interaction, limiting the ease of exploitation but still posing a risk in environments where users access the device's web interface regularly.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, or critical infrastructure sectors that deploy Delta Electronics DX-2100-L1-CN devices, this vulnerability could lead to unauthorized disclosure of sensitive information or manipulation of device configurations through injected scripts. Compromise of confidentiality could facilitate further attacks such as session hijacking or credential theft, potentially leading to broader network compromise. Although availability is not directly impacted, the integrity of device management interfaces could be undermined, affecting operational reliability. Given the medium severity and requirement for authenticated access, the threat is more pronounced in environments with weak access controls or where users may be susceptible to social engineering. The risk is heightened in sectors where these devices are integrated into supervisory control and data acquisition (SCADA) systems or other critical operational technology, as exploitation could indirectly impact industrial processes or safety systems.

Mitigation Recommendations

Organizations should implement strict access controls to limit who can authenticate to the device's web interface, including enforcing strong, unique passwords and multi-factor authentication if supported. Network segmentation should isolate these devices from general IT networks and restrict access to trusted personnel only. Monitoring and logging of web interface access can help detect suspicious activities. Since no patches are currently available, applying web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block XSS payloads targeting the 'lform/urlfilter' parameter can provide interim protection. User training to recognize phishing or social engineering attempts that could trigger malicious scripts is also recommended. Regularly reviewing device firmware updates from Delta Electronics and applying patches promptly once released is critical. Additionally, consider disabling or restricting web interface access if not necessary for daily operations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-03T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf716e

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 6:53:00 PM

Last updated: 7/26/2025, 1:56:48 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats