8.8
HIGH
CVE-2022-27632
"Rebooter, PoE Rebooter, Scheduler, and Contact Converter CSRF Authentication Hijack"
Description

Cross-site request forgery (CSRF) vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, WATCH BOOT mini RPC-M4H [End of Sale] all firmware versions, WATCH BOOT nino RPC-M2CS firmware version 1.00A to 1.00D, WATCH BOOT light RPC-M5CS firmware version 1.00A to 1.00D, WATCH BOOT L-zero RPC-M4LS firmware version 1.00A to 1.20A, and Signage Rebooter RPC-M4HSi firmware version 1.00A), PoE Rebooter(PoE BOOT nino PoE8M2 firmware version 1.00A to 1.20A), Scheduler(TIME BOOT mini RSC-MT4H [End of Sale] all firmware versions, TIME BOOT RSC-MT8F [End of Sale] all firmware versions, TIME BOOT RSC-MT8FP [End of Sale] all firmware versions, TIME BOOT mini RSC-MT4HS firmware version 1.00A to 1.10A, and TIME BOOT RSC-MT8FS firmware version 1.00A to 1.00E), and Contact Converter(POSE SE10-8A7B1 firmware version 1.00A to 1.20A) allows a remote attacker to hijack the authentication of an administrator and conduct arbitrary operations by having a user to view a specially crafted page.

INFO

Published Date :

May 18, 2022, 3:15 p.m.

Last Modified :

Nov. 21, 2024, 6:56 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.8
Affected Products

The following products are affected by CVE-2022-27632 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Meikyo watch_boot_nino_rpc-m2c_firmware
2 Meikyo watch_boot_light_rpc-m5c_firmware
3 Meikyo watch_boot_l-zero_rpc-m4l_firmware
4 Meikyo watch_boot_mini_rpc-m4h_firmware
5 Meikyo watch_boot_nino_rpc-m2cs_firmware
6 Meikyo watch_boot_light_rpc-m5cs_firmware
7 Meikyo watch_boot_l-zero_rpc-m4ls_firmware
8 Meikyo signage_rebooter_rpc-m4hsi_firmware
9 Meikyo poe_boot_nino_poe8m2_firmware
10 Meikyo time_boot_mini_rsc-mt4h_firmware
11 Meikyo time_boot_rsc-mt8f_firmware
12 Meikyo time_boot_rsc-mt8fp_firmware
13 Meikyo time_boot_mini_rsc-mt4hs_firmware
14 Meikyo time_boot_rsc-mt8fs_firmware
15 Meikyo pose_se10-8a7b1_firmware
16 Meikyo watch_boot_nino_rpc-m2c
17 Meikyo watch_boot_light_rpc-m5c
18 Meikyo watch_boot_l-zero_rpc-m4l
19 Meikyo watch_boot_mini_rpc-m4h
20 Meikyo watch_boot_nino_rpc-m2cs
21 Meikyo watch_boot_light_rpc-m5cs
22 Meikyo watch_boot_l-zero_rpc-m4ls
23 Meikyo signage_rebooter_rpc-m4hsi
24 Meikyo poe_boot_nino_poe8m2
25 Meikyo time_boot_mini_rsc-mt4h
26 Meikyo time_boot_rsc-mt8f
27 Meikyo time_boot_rsc-mt8fp
28 Meikyo time_boot_mini_rsc-mt4hs
29 Meikyo time_boot_rsc-mt8fs
30 Meikyo pose_se10-8a7b1
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-27632.

URL Resource
https://jvn.jp/en/jp/JVN58266015/index.html Third Party Advisory
https://www.meikyo.co.jp/vln/ Patch Vendor Advisory
https://jvn.jp/en/jp/JVN58266015/index.html Third Party Advisory
https://www.meikyo.co.jp/vln/ Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-27632 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-27632 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://jvn.jp/en/jp/JVN58266015/index.html
    Added Reference https://www.meikyo.co.jp/vln/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Jun. 02, 2022

    Action Type Old Value New Value
    Added CVSS V2 Metadata Victim must voluntarily interact with attack mechanism
    Added CVSS V2 NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type https://jvn.jp/en/jp/JVN58266015/index.html No Types Assigned https://jvn.jp/en/jp/JVN58266015/index.html Third Party Advisory
    Changed Reference Type https://www.meikyo.co.jp/vln/ No Types Assigned https://www.meikyo.co.jp/vln/ Patch, Vendor Advisory
    Added CWE NIST CWE-352
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_nino_rpc-m2c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:watch_boot_nino_rpc-m2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_light_rpc-m5c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:watch_boot_light_rpc-m5c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_l-zero_rpc-m4l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:watch_boot_l-zero_rpc-m4l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_mini_rpc-m4h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:watch_boot_mini_rpc-m4h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_nino_rpc-m2cs_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.00d OR cpe:2.3:h:meikyo:watch_boot_nino_rpc-m2cs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_light_rpc-m5cs_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.00d OR cpe:2.3:h:meikyo:watch_boot_light_rpc-m5cs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:watch_boot_l-zero_rpc-m4ls_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.20a OR cpe:2.3:h:meikyo:watch_boot_l-zero_rpc-m4ls:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:signage_rebooter_rpc-m4hsi_firmware:1.00a:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:signage_rebooter_rpc-m4hsi:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:poe_boot_nino_poe8m2_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.20a OR cpe:2.3:h:meikyo:poe_boot_nino_poe8m2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:time_boot_mini_rsc-mt4h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:time_boot_mini_rsc-mt4h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:time_boot_rsc-mt8f_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:time_boot_rsc-mt8f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:time_boot_rsc-mt8fp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:meikyo:time_boot_rsc-mt8fp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:time_boot_mini_rsc-mt4hs_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.10a OR cpe:2.3:h:meikyo:time_boot_mini_rsc-mt4hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:time_boot_rsc-mt8fs_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.00e OR cpe:2.3:h:meikyo:time_boot_rsc-mt8fs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meikyo:pose_se10-8a7b1_firmware:-:*:*:*:*:*:*:* *cpe:2.3:o:meikyo:pose_se10-8a7b1_firmware:*:*:*:*:*:*:*:* versions from (including) 1.00a up to (including) 1.20a OR cpe:2.3:h:meikyo:pose_se10-8a7b1:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-27632 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-27632 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.12 }} -0.08%

score

0.32573

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Jun. 03, 2025 17:33