First published: Mon Feb 06 2023(Updated: )
Because the web management interface for Unified Intents' Unified Remote solution does not itself require authentication, a remote, unauthenticated attacker can change or disable authentication requirements for the Unified Remote protocol, and leverage this now-unauthenticated access to run code of the attacker's choosing.
Credit: cve@rapid7.con cve@rapid7.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Unified Remote | <=3.11.0.2483 | |
Microsoft Windows Operating System | ||
Unified Remote | <=3.11.0.2483 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3229 is classified as a high severity vulnerability due to the potential for remote, unauthenticated attackers to exploit it.
To fix CVE-2022-3229, ensure that your Unified Remote solution is updated to a version later than 3.11.0.2483, which addresses this vulnerability.
An attacker can exploit CVE-2022-3229 to change or disable authentication requirements, enabling them to run unauthorized code remotely.
CVE-2022-3229 affects all versions of Unified Remote up to and including version 3.11.0.2483.
CVE-2022-3229 affects Unified Remote software and is unrelated to the operating system; however, it runs on Microsoft Windows.