Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Keysight recommends users update N6854A and N6841A RF to v2.4.0 or later. Keysight also recommends users take the following actions to help reduce risk: Block incoming connection on TCP port number defined by environment variable KEYSIGHT_SMS_PORT (default: 8080)
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24947 | The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-01 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:17:33.446Z
Reserved: 2022-05-10T00:00:00.000Z
Link: CVE-2022-1661
Updated: 2024-08-03T00:10:03.767Z
Status : Modified
Published: 2022-06-02T14:15:33.070
Modified: 2024-11-21T06:41:12.107
Link: CVE-2022-1661
No data.
OpenCVE Enrichment
No data.
EUVD