CVE-2022-42141: n/a in n/a
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.
AI Analysis
Technical Summary
CVE-2022-42141 is a Cross Site Scripting (XSS) vulnerability identified in the Delta Electronics DX-2100-L1-CN device, specifically version 2.42. The vulnerability arises from improper sanitization of user-supplied input in the 'lform/urlfilter' parameter, which allows an attacker to inject malicious scripts into web pages viewed by other users. This type of vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), but requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the malicious script execution. The vulnerability impacts confidentiality and integrity by potentially allowing theft of session tokens, credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity issue. No known public exploits or patches are currently available, and the vendor or product details beyond the device model are not specified. The device in question is likely used in industrial or automation contexts, given Delta Electronics' product portfolio, which may expose operational technology environments to risk if the device is accessible via web interfaces. The vulnerability requires authenticated access and user interaction, limiting the ease of exploitation but still posing a risk in environments where users access the device's web interface regularly.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, or critical infrastructure sectors that deploy Delta Electronics DX-2100-L1-CN devices, this vulnerability could lead to unauthorized disclosure of sensitive information or manipulation of device configurations through injected scripts. Compromise of confidentiality could facilitate further attacks such as session hijacking or credential theft, potentially leading to broader network compromise. Although availability is not directly impacted, the integrity of device management interfaces could be undermined, affecting operational reliability. Given the medium severity and requirement for authenticated access, the threat is more pronounced in environments with weak access controls or where users may be susceptible to social engineering. The risk is heightened in sectors where these devices are integrated into supervisory control and data acquisition (SCADA) systems or other critical operational technology, as exploitation could indirectly impact industrial processes or safety systems.
Mitigation Recommendations
Organizations should implement strict access controls to limit who can authenticate to the device's web interface, including enforcing strong, unique passwords and multi-factor authentication if supported. Network segmentation should isolate these devices from general IT networks and restrict access to trusted personnel only. Monitoring and logging of web interface access can help detect suspicious activities. Since no patches are currently available, applying web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block XSS payloads targeting the 'lform/urlfilter' parameter can provide interim protection. User training to recognize phishing or social engineering attempts that could trigger malicious scripts is also recommended. Regularly reviewing device firmware updates from Delta Electronics and applying patches promptly once released is critical. Additionally, consider disabling or restricting web interface access if not necessary for daily operations.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2022-42141: n/a in n/a
Description
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.
AI-Powered Analysis
Technical Analysis
CVE-2022-42141 is a Cross Site Scripting (XSS) vulnerability identified in the Delta Electronics DX-2100-L1-CN device, specifically version 2.42. The vulnerability arises from improper sanitization of user-supplied input in the 'lform/urlfilter' parameter, which allows an attacker to inject malicious scripts into web pages viewed by other users. This type of vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), but requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to trigger the malicious script execution. The vulnerability impacts confidentiality and integrity by potentially allowing theft of session tokens, credentials, or manipulation of displayed content, but does not affect availability. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The CVSS v3.1 base score is 5.4, categorizing it as a medium severity issue. No known public exploits or patches are currently available, and the vendor or product details beyond the device model are not specified. The device in question is likely used in industrial or automation contexts, given Delta Electronics' product portfolio, which may expose operational technology environments to risk if the device is accessible via web interfaces. The vulnerability requires authenticated access and user interaction, limiting the ease of exploitation but still posing a risk in environments where users access the device's web interface regularly.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, or critical infrastructure sectors that deploy Delta Electronics DX-2100-L1-CN devices, this vulnerability could lead to unauthorized disclosure of sensitive information or manipulation of device configurations through injected scripts. Compromise of confidentiality could facilitate further attacks such as session hijacking or credential theft, potentially leading to broader network compromise. Although availability is not directly impacted, the integrity of device management interfaces could be undermined, affecting operational reliability. Given the medium severity and requirement for authenticated access, the threat is more pronounced in environments with weak access controls or where users may be susceptible to social engineering. The risk is heightened in sectors where these devices are integrated into supervisory control and data acquisition (SCADA) systems or other critical operational technology, as exploitation could indirectly impact industrial processes or safety systems.
Mitigation Recommendations
Organizations should implement strict access controls to limit who can authenticate to the device's web interface, including enforcing strong, unique passwords and multi-factor authentication if supported. Network segmentation should isolate these devices from general IT networks and restrict access to trusted personnel only. Monitoring and logging of web interface access can help detect suspicious activities. Since no patches are currently available, applying web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block XSS payloads targeting the 'lform/urlfilter' parameter can provide interim protection. User training to recognize phishing or social engineering attempts that could trigger malicious scripts is also recommended. Regularly reviewing device firmware updates from Delta Electronics and applying patches promptly once released is critical. Additionally, consider disabling or restricting web interface access if not necessary for daily operations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-03T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf716e
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 6:53:00 PM
Last updated: 7/26/2025, 1:56:48 AM
Views: 10
Related Threats
CVE-2025-8859: Unrestricted Upload in code-projects eBlog Site
MediumCVE-2025-8865: CWE-476 NULL Pointer Dereference in YugabyteDB Inc YugabyteDB
MediumCVE-2025-8852: Information Exposure Through Error Message in WuKongOpenSource WukongCRM
MediumCVE-2025-8864: CWE-532 Insertion of Sensitive Information into Log File in YugabyteDB Inc YugabyteDB Anywhere
MediumCVE-2025-8851: Stack-based Buffer Overflow in LibTIFF
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.