Skip to main content

CVE-2022-45028: n/a in n/a

Medium
VulnerabilityCVE-2022-45028cvecve-2022-45028n-acwe-79
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.

AI-Powered Analysis

AILast updated: 06/21/2025, 16:36:29 UTC

Technical Analysis

CVE-2022-45028 is a cross-site scripting (XSS) vulnerability identified in the Arris NVG443B router firmware version 9.3.0h3d36. The vulnerability arises due to improper sanitization of user-supplied input in the web management interface, specifically when processing POST requests sent to the /cgi-bin/logs.ha endpoint. An attacker can exploit this flaw by crafting a malicious POST request containing executable JavaScript or HTML code. When the router's web interface processes this request, the injected script executes in the context of the victim's browser session. This can lead to unauthorized actions such as session hijacking, credential theft, or the manipulation of router settings through the victim's authenticated session. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R), such as the victim visiting a malicious page or clicking a link that triggers the crafted POST request. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked, suggesting that mitigation may rely on configuration changes or vendor updates when available. The vulnerability falls under CWE-79, a common web application security weakness related to improper neutralization of input leading to XSS attacks.

Potential Impact

For European organizations, the exploitation of this XSS vulnerability on Arris NVG443B routers could lead to unauthorized access to router management interfaces, potentially allowing attackers to alter network configurations, redirect traffic, or intercept sensitive data. While the direct impact on availability is negligible, the compromise of router integrity and confidentiality can facilitate further attacks within the network, such as man-in-the-middle attacks or lateral movement. Organizations relying on these routers for critical network infrastructure, especially in small to medium enterprises or home office environments, may face increased risk of data leakage or network manipulation. The requirement for user interaction limits large-scale automated exploitation but does not eliminate targeted attacks, particularly spear-phishing or social engineering campaigns aimed at network administrators or users with access to the router interface. Given the router's role as a gateway device, successful exploitation could undermine perimeter security, affecting the confidentiality and integrity of internal communications and data.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the router's web management interface to trusted networks only, ideally via VPN or secure management VLANs, to prevent exposure to untrusted users. 2. Disable remote management features if not strictly necessary, reducing the attack surface. 3. Implement strict input validation and sanitization on the router's web interface if vendor updates or patches become available; monitor vendor advisories for firmware updates addressing this vulnerability. 4. Employ network-level protections such as web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious POST requests targeting /cgi-bin/logs.ha. 5. Educate users and administrators about the risks of interacting with unsolicited links or web content that could trigger malicious POST requests, emphasizing cautious behavior to mitigate user interaction requirements. 6. Regularly audit router configurations and logs for signs of unauthorized access or anomalous POST requests. 7. Consider replacing or upgrading affected hardware if vendor support is discontinued or patches are unavailable, to ensure long-term security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf77a2

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 4:36:29 PM

Last updated: 8/11/2025, 7:39:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats