Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44355: n/a in n/a

0
Medium
VulnerabilityCVE-2022-44355cvecve-2022-44355n-acwe-79
Published: Tue Nov 29 2022 (11/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

SolarView Compact 7.0 is vulnerable to Cross-site Scripting (XSS) via /network_test.php.

AI-Powered Analysis

AILast updated: 06/24/2025, 12:43:59 UTC

Technical Analysis

CVE-2022-44355 is a Cross-site Scripting (XSS) vulnerability affecting SolarView Compact version 7.0, specifically via the /network_test.php endpoint. XSS vulnerabilities arise when an application includes untrusted user input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts. In this case, the vulnerability permits an attacker to craft a specially designed request to the /network_test.php page, which then reflects the malicious script back to the user's browser. This can lead to the execution of arbitrary JavaScript in the context of the victim's session. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be performed remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (such as clicking a malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity at a low level, with no impact on availability. No known exploits are reported in the wild, and no patches or vendor details are provided in the available information. The vulnerability is categorized under CWE-79, which is the standard classification for XSS issues. Given the lack of vendor and product details, the analysis focuses on SolarView Compact 7.0, which is a network monitoring or management tool, likely used in industrial or enterprise environments to oversee network infrastructure.

Potential Impact

For European organizations using SolarView Compact 7.0, this XSS vulnerability could allow attackers to execute malicious scripts in the context of authenticated users accessing the /network_test.php page. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. While the direct impact on system availability is none, the compromise of user sessions can lead to further lateral movement or data leakage within the network. Given that SolarView Compact is likely used in network management, attackers exploiting this vulnerability could gain footholds in critical infrastructure or enterprise networks. The medium severity suggests that while the vulnerability is not trivial, exploitation requires user interaction, limiting mass exploitation but still posing a risk in targeted attacks. European organizations in sectors such as manufacturing, utilities, or telecommunications that rely on SolarView Compact for network monitoring could face increased risk of espionage or sabotage if this vulnerability is exploited. The lack of patches increases the urgency for mitigation.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the /network_test.php endpoint to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the SolarView Compact interface. 3. Restrict access to the SolarView Compact web interface to trusted networks or VPNs to reduce exposure to external attackers. 4. Educate users to avoid clicking on suspicious links or opening untrusted content that could trigger the XSS attack. 5. Monitor web server logs for unusual requests targeting /network_test.php that may indicate exploitation attempts. 6. If possible, isolate the SolarView Compact management interface from general user networks to limit the impact of a compromised session. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability, and apply them promptly once available. 8. Consider deploying Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf040b

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 12:43:59 PM

Last updated: 2/7/2026, 11:21:15 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats