Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Keysight recommends users update N6854A and N6841A RF to v2.4.0 or later. Keysight also recommends users take the following actions to help reduce risk: Block incoming connection on TCP port number defined by environment variable KEYSIGHT_SMS_PORT (default: 8080)
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24946 | The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-01 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:17:41.641Z
Reserved: 2022-05-10T00:00:00.000Z
Link: CVE-2022-1660
Updated: 2024-08-03T00:10:03.803Z
Status : Modified
Published: 2022-06-02T14:15:32.993
Modified: 2024-11-21T06:41:11.947
Link: CVE-2022-1660
No data.
OpenCVE Enrichment
No data.
EUVD