Skip to main content

CVE-2022-45182: n/a in n/a

Critical
VulnerabilityCVE-2022-45182cvecve-2022-45182
Published: Fri Nov 11 2022 (11/11/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:41:14 UTC

Technical Analysis

CVE-2022-45182 is a critical vulnerability identified in Pi-Star_DV_Dash, a component related to Pi-Star DV, which is a digital voice hotspot software commonly used in amateur radio communications. The vulnerability arises from improper handling of the 'module' parameter before the commit 5aa194d. Specifically, this mishandling corresponds to a CWE-233 weakness, which relates to improper handling of external input leading to a potential denial of service or other impacts. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This suggests that an unauthenticated attacker can remotely exploit this vulnerability without user interaction, potentially leading to full compromise of the affected system. Although no public exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability imply that exploitation could allow attackers to execute arbitrary commands, disrupt services, or exfiltrate sensitive data. The lack of vendor and product details in the provided information limits precise identification, but the reference to Pi-Star_DV_Dash indicates the affected software is niche and specialized for digital voice communications in amateur radio contexts.

Potential Impact

For European organizations, especially those involved in amateur radio, emergency communications, or digital voice networks, this vulnerability poses a significant risk. Exploitation could lead to service outages, loss of communication capabilities, or unauthorized access to sensitive communication channels. Given the criticality and ease of exploitation, attackers could disrupt emergency response communications or intercept confidential transmissions. While the affected software is specialized, some European countries have active amateur radio communities and emergency communication networks that rely on Pi-Star DV hotspots. Disruption or compromise in these systems could degrade operational readiness and trust in communication infrastructure. Additionally, if these systems are integrated into broader organizational networks, the vulnerability could serve as a pivot point for further attacks.

Mitigation Recommendations

Organizations using Pi-Star DV or Pi-Star_DV_Dash should immediately verify their software version and update to the fixed version beyond commit 5aa194d where the module parameter handling is corrected. Since no patch links are provided, users should monitor official Pi-Star repositories or trusted community channels for updates. Network-level mitigations include restricting access to the affected services via firewall rules, limiting exposure to untrusted networks, and employing intrusion detection systems to monitor anomalous traffic targeting the module parameter. Additionally, organizations should conduct thorough audits of their digital voice communication infrastructure to identify any unauthorized access or anomalies. Implementing network segmentation to isolate these devices from critical infrastructure can reduce potential impact. Finally, raising awareness among amateur radio operators and emergency communication teams about this vulnerability is essential to ensure timely patching and risk reduction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbeceeb

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:41:14 AM

Last updated: 7/29/2025, 4:36:16 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats