Headline
CVE-2022-1318
Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required.
%PDF-1.6 %���� 114 0 obj <> endobj 140 0 obj <>/Filter/FlateDecode/ID[<03CA1832E0FBA648A246F23A6EAE1B0B>]/Index[114 43]/Info 113 0 R/Length 122/Prev 179364/Root 115 0 R/Size 157/Type/XRef/W[1 3 1]>>stream h�bbd```b``�"��H�&�b"=��)X�XVL���`�#`v�}̮���F�`%�� $�@�i v�q��4���ۥ "�j�俜&��nc`�2���i�’��l endstream endobj startxref 0 %%EOF 156 0 obj <>stream h�b```���+�@��(�����a!��n�� O[�CI�抎�4��bFM�HfnyFfF�m����21 F0�LO��>�6g�"_a�`g��L�-@&Q�fa`Z��g� ����iw2T�#@�&* endstream endobj 115 0 obj <>/Metadata 5 0 R/Outlines 9 0 R/PageLayout/OneColumn/Pages 112 0 R/StructTreeRoot 20 0 R/Type/Catalog>> endobj 116 0 obj <>/Font<>/XObject<>>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 117 0 obj <>stream hVmo�8�+������z10H�fɺ$]���Zḵ�ۭ��(%v,’N��,F�H��C�4�� 0���%��\�,��f�B"`�5J�!�C`h [A�r�1N��`����pĴ�*�-q�� ��^�|����]N��()��8�Q�=D�"���Z��f�(��P��4x:��`�<{Y|�|?-���y��e�վ�3뿘����1���o?=�Hr���Ju�)��$z*���������.cu���8N;�q��f%�<~�Z��ܾӉ[G�o��’�ۓ��[���)���U����L!���y/}J"xZ��g����Ԟ9��e��/�R�����X�vЋt�=�����^Z���a���9ʫko�;F؛\GkJ���J{���N4�n��Pkg_�=���=c��OPu�&p|s���E�~�z���N��N����1�;��|�|�g_x��,y<@�A`�~�(��fW�#�#|���;���D��B. �� �����#�8r�<�7��6�z�yvu�G�c3]�E��#� z$X���2܋#h)��K��EA����l�r� ���)�=�b��W�*;�GC�����$)���.U��Fn��9�Vk%�?����V{HuV瑼������O�y e��U�AЬ`R;����<��S���M�E��!��\]�?\��-��m����`����d��~��ɾ$�#IiA�yg��@�,U4VQ��s�]�P?��?|x����v�:����@�|]���8L�1���h3U��/?� �}�Q’.�a�jS�*+�.$j]�`n�C�N~(���1�tU+�P+|f��/��?U��W�������u���Hnl}��j�O�Z]�k����d ��’��l��(b �ݿHc�v�����vT1쬁���ʫ�is��k*���_��L����^��(7�����_p.�� endstream endobj 118 0 obj <>stream H�\��j�0��~ �CqHr1��Q�a,�$���8�!o?�.�`�’��d�_������[9`�Y�q���.ڰ��e�{���’�pl��̖ ���[���������W�Y��u���ݹ\�(��@�L�^F�:�<�.���Dž4��C��_��H�ps�D?��(�t nt:�F���Y5��{�LT1�(�0Qg�#7eb2�u�:r����fn#�2���;- ���{�*m2���v���e��f}B endstream endobj 119 0 obj <>stream H�\P�j�0��+tlʼn{5��1�akY�pl%5,�Q�C�~�S:�@���{