Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45182: n/a in n/a

0
Critical
VulnerabilityCVE-2022-45182cvecve-2022-45182
Published: Fri Nov 11 2022 (11/11/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:41:14 UTC

Technical Analysis

CVE-2022-45182 is a critical vulnerability identified in Pi-Star_DV_Dash, a component related to Pi-Star DV, which is a digital voice hotspot software commonly used in amateur radio communications. The vulnerability arises from improper handling of the 'module' parameter before the commit 5aa194d. Specifically, this mishandling corresponds to a CWE-233 weakness, which relates to improper handling of external input leading to a potential denial of service or other impacts. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This suggests that an unauthenticated attacker can remotely exploit this vulnerability without user interaction, potentially leading to full compromise of the affected system. Although no public exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability imply that exploitation could allow attackers to execute arbitrary commands, disrupt services, or exfiltrate sensitive data. The lack of vendor and product details in the provided information limits precise identification, but the reference to Pi-Star_DV_Dash indicates the affected software is niche and specialized for digital voice communications in amateur radio contexts.

Potential Impact

For European organizations, especially those involved in amateur radio, emergency communications, or digital voice networks, this vulnerability poses a significant risk. Exploitation could lead to service outages, loss of communication capabilities, or unauthorized access to sensitive communication channels. Given the criticality and ease of exploitation, attackers could disrupt emergency response communications or intercept confidential transmissions. While the affected software is specialized, some European countries have active amateur radio communities and emergency communication networks that rely on Pi-Star DV hotspots. Disruption or compromise in these systems could degrade operational readiness and trust in communication infrastructure. Additionally, if these systems are integrated into broader organizational networks, the vulnerability could serve as a pivot point for further attacks.

Mitigation Recommendations

Organizations using Pi-Star DV or Pi-Star_DV_Dash should immediately verify their software version and update to the fixed version beyond commit 5aa194d where the module parameter handling is corrected. Since no patch links are provided, users should monitor official Pi-Star repositories or trusted community channels for updates. Network-level mitigations include restricting access to the affected services via firewall rules, limiting exposure to untrusted networks, and employing intrusion detection systems to monitor anomalous traffic targeting the module parameter. Additionally, organizations should conduct thorough audits of their digital voice communication infrastructure to identify any unauthorized access or anomalies. Implementing network segmentation to isolate these devices from critical infrastructure can reduce potential impact. Finally, raising awareness among amateur radio operators and emergency communication teams about this vulnerability is essential to ensure timely patching and risk reduction.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbeceeb

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:41:14 AM

Last updated: 2/7/2026, 12:04:40 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats