7.5
CWE
22
Advisory Published
Updated

CVE-2022-3090: Path Traversal

First published: Thu Nov 17 2022(Updated: )

Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Red Lion Controls Crimson 3.0
Red Lion Controls Crimson 3.1
Red Lion Controls Crimson 3.2
Red Lion Crimson<3.0
Red Lion Crimson=3.0
Red Lion Crimson=3.0-build_477.003
Red Lion Crimson=3.0-build_493.003
Red Lion Crimson=3.0-build_493.004
Red Lion Crimson=3.0-build_493.005
Red Lion Crimson=3.0-build_502.000
Red Lion Crimson=3.0-build_502.001
Red Lion Crimson=3.0-build_502.003
Red Lion Crimson=3.0-build_515.002
Red Lion Crimson=3.0-build_515.003
Red Lion Crimson=3.0-build_523.003
Red Lion Crimson=3.0-build_530.000
Red Lion Crimson=3.0-build_530.001
Red Lion Crimson=3.0-build_530.002
Red Lion Crimson=3.0-build_530.003
Red Lion Crimson=3.0-build_548.001
Red Lion Crimson=3.0-build_548.005
Red Lion Crimson=3.0-build_573.001
Red Lion Crimson=3.0-build_573.002
Red Lion Crimson=3.0-build_579.001
Red Lion Crimson=3.0-build_579.003
Red Lion Crimson=3.0-build_582.000
Red Lion Crimson=3.0-build_582.001
Red Lion Crimson=3.0-build_582.003
Red Lion Crimson=3.0-build_582.004
Red Lion Crimson=3.0-build_599.000
Red Lion Crimson=3.0-build_599.001
Red Lion Crimson=3.0-build_603.000
Red Lion Crimson=3.0-build_605.002
Red Lion Crimson=3.0-build_615.004
Red Lion Crimson=3.0-build_619.002
Red Lion Crimson=3.0-build_619.004
Red Lion Crimson=3.0-build_624.000
Red Lion Crimson=3.0-build_624.005
Red Lion Crimson=3.0-build_635.000
Red Lion Crimson=3.0-build_635.001
Red Lion Crimson=3.0-build_639.000
Red Lion Crimson=3.0-build_640.000
Red Lion Crimson=3.0-build_640.001
Red Lion Crimson=3.0-build_640.002
Red Lion Crimson=3.0-build_647.002
Red Lion Crimson=3.0-build_657.001
Red Lion Crimson=3.0-build_657.003
Red Lion Crimson=3.0-build_662.002
Red Lion Crimson=3.0-build_662.006
Red Lion Crimson=3.0-build_675.000
Red Lion Crimson=3.0-build_678.002
Red Lion Crimson=3.0-build_683.000
Red Lion Crimson=3.0-build_683.001
Red Lion Crimson=3.0-build_683.002
Red Lion Crimson=3.0-build_690.001
Red Lion Crimson=3.0-build_690.002
Red Lion Crimson=3.0-build_693.000
Red Lion Crimson=3.0-build_694.000
Red Lion Crimson=3.0-build_697.001
Red Lion Crimson=3.0-build_697.002
Red Lion Crimson=3.0-build_697.003
Red Lion Crimson=3.0-build_700.000
Red Lion Crimson=3.0-build_702.002
Red Lion Crimson=3.0-build_702.004
Red Lion Crimson=3.0-build_703.001
Red Lion Crimson=3.0-build_705.000
Red Lion Crimson=3.0-build_707.000
Red Lion Crimson=3.1
Red Lion Crimson=3.1-build_3100.000
Red Lion Crimson=3.1-build_3100.002
Red Lion Crimson=3.1-build_3100.003
Red Lion Crimson=3.1-build_3100.008
Red Lion Crimson=3.1-build_3100.009
Red Lion Crimson=3.1-build_3100.010
Red Lion Crimson=3.1-build_3101.001
Red Lion Crimson=3.1-build_3104.000
Red Lion Crimson=3.1-build_3106.000
Red Lion Crimson=3.1-build_3106.004
Red Lion Crimson=3.1-build_3108.002
Red Lion Crimson=3.1-build_3108.004
Red Lion Crimson=3.1-build_3109.003
Red Lion Crimson=3.1-build_3109.004
Red Lion Crimson=3.1-build_3110.000
Red Lion Crimson=3.1-build_3110.002
Red Lion Crimson=3.1-build_3110.004
Red Lion Crimson=3.1-build_3111.000
Red Lion Crimson=3.1-build_3112.000
Red Lion Crimson=3.1-build_3113.000
Red Lion Crimson=3.1-build_3114.002
Red Lion Crimson=3.1-build_3115.006
Red Lion Crimson=3.1-build_3115.008
Red Lion Crimson=3.1-build_3115.009
Red Lion Crimson=3.1-build_3116.000
Red Lion Crimson=3.1-build_3119.001
Red Lion Crimson=3.1-build_3119.002
Red Lion Crimson=3.1-build_3120.000
Red Lion Crimson=3.1-build_3120.001
Red Lion Crimson=3.1-build_3121.000
Red Lion Crimson=3.1-build_3122.000
Red Lion Crimson=3.1-build_3122.001
Red Lion Crimson=3.1-build_3123.000
Red Lion Crimson=3.1-build_3123.001
Red Lion Crimson=3.1-build_3124.000
Red Lion Crimson=3.1-build_3125.003
Red Lion Crimson=3.1-build_3125.006
Red Lion Crimson=3.1-build_3125.007
Red Lion Crimson=3.1-build_3126.000
Red Lion Crimson=3.1-build_3126.001
Red Lion Crimson=3.2
Red Lion Crimson=3.2-build_3.2.0008.0
Red Lion Crimson=3.2-build_3.2.0014.0
Red Lion Crimson=3.2-build_3.2.0015.0
Red Lion Crimson=3.2-build_3.2.0016.0
Red Lion Crimson=3.2-build_3.2.0020.0
Red Lion Crimson=3.2-build_3.2.0021.0
Red Lion Crimson=3.2-build_3.2.0025.0
Red Lion Crimson=3.2-build_3.2.0026.0
Red Lion Crimson=3.2-build_3.2.0030.0
Red Lion Crimson=3.2-build_3.2.0031.0
Red Lion Crimson=3.2-build_3.2.0035.0
Red Lion Crimson=3.2-build_3.2.0036.0
Red Lion Crimson=3.2-build_3.2.0040.0
Red Lion Crimson=3.2-build_3.2.0041.0
Red Lion Crimson=3.2-build_3.2.0044.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2022-3090?

    CVE-2022-3090 has a critical severity rating due to its potential to transmit a user's password hash to an arbitrary host.

  • How do I fix CVE-2022-3090?

    To mitigate CVE-2022-3090, update your Red Lion Controls Crimson software to a version that is not vulnerable, specifically versions 3.0.707.001 or later, 3.1.3126.002 or later, or 3.2.3.2.0045.0 or later.

  • What software versions are affected by CVE-2022-3090?

    CVE-2022-3090 affects Red Lion Controls Crimson versions 3.0: 707.000 and prior, 3.1: 3126.001 and prior, and 3.2: 3.2.0044.0 and prior.

  • What are the risks associated with CVE-2022-3090?

    The risks of CVE-2022-3090 include unauthorized access to sensitive information due to the exposure of user password hashes.

  • Is CVE-2022-3090 being actively exploited?

    There is no public evidence indicating that CVE-2022-3090 is currently being actively exploited in the wild.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203