First published: Wed Feb 09 2022(Updated: )
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists that could induce users to perform unintended actions, leading to the override of the system?s configurations when an attacker persuades a user to visit a rogue website. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Spacelynk Firmware | <=2.6.2 | |
Schneider-electric Spacelynk | ||
Schneider-electric Wiser For Knx Firmware | <=2.6.2 | |
Schneider-electric Wiser For Knx | ||
Schneider-electric Fellerlynk Firmware | <=2.6.2 | |
Schneider-electric Fellerlynk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22811 refers to a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to induce users to perform unintended actions.
CVE-2022-22811 works by persuading a user to visit a rogue website, which can lead to the override of the system's configurations.
CVE-2022-22811 has a severity rating of 8.1 which is considered high.
CVE-2022-22811 affects spaceLYnk (V2.6.2 and prior), Wiser for KNX (V2.6.2 and prior), and Fellerlynk (V2.6.2 and prior) firmware.
To fix CVE-2022-22811, it is recommended to update affected products to a version that has addressed the CSRF vulnerability.