CVE-2022-26078
 
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a.
El controlador Gallagher 6000 es vulnerable a un ataque de Denegación de Servicio por medio de paquetes ARP conflictivos con una dirección IP duplicada. Este problema afecta: Gallagher Controller 6000 versiones vCR8.60 anteriores a 220303a; versiones vCR8.50 anteriores a 220303a; versiones vCR8.40 anteriores a 220303a; versiones vCR8.30 anteriores a 220303a
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-03-04 CVE Reserved
- 2022-07-06 CVE Published
- 2024-01-27 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gallagher.com/Security-Advisories/CVE-2022-26078 | 2022-07-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gallagher Search vendor "Gallagher" | Controller 6000 Firmware Search vendor "Gallagher" for product "Controller 6000 Firmware" | >= 8.30 < 8.30.220303a Search vendor "Gallagher" for product "Controller 6000 Firmware" and version " >= 8.30 < 8.30.220303a" | - |
Affected
| in | Gallagher Search vendor "Gallagher" | Controller 6000 Search vendor "Gallagher" for product "Controller 6000" | - | - |
Safe
|
Gallagher Search vendor "Gallagher" | Controller 6000 Firmware Search vendor "Gallagher" for product "Controller 6000 Firmware" | >= 8.40 < 8.40.220303a Search vendor "Gallagher" for product "Controller 6000 Firmware" and version " >= 8.40 < 8.40.220303a" | - |
Affected
| in | Gallagher Search vendor "Gallagher" | Controller 6000 Search vendor "Gallagher" for product "Controller 6000" | - | - |
Safe
|
Gallagher Search vendor "Gallagher" | Controller 6000 Firmware Search vendor "Gallagher" for product "Controller 6000 Firmware" | >= 8.50 < 8.50.220303a Search vendor "Gallagher" for product "Controller 6000 Firmware" and version " >= 8.50 < 8.50.220303a" | - |
Affected
| in | Gallagher Search vendor "Gallagher" | Controller 6000 Search vendor "Gallagher" for product "Controller 6000" | - | - |
Safe
|
Gallagher Search vendor "Gallagher" | Controller 6000 Firmware Search vendor "Gallagher" for product "Controller 6000 Firmware" | >= 8.60 < 8.60.220303a Search vendor "Gallagher" for product "Controller 6000 Firmware" and version " >= 8.60 < 8.60.220303a" | - |
Affected
| in | Gallagher Search vendor "Gallagher" | Controller 6000 Search vendor "Gallagher" for product "Controller 6000" | - | - |
Safe
|