CVSS 3.1 Score 8.8 of 10 (high)


Published Dec 5, 2023
Updated: Dec 11, 2023


CVE-2022-47531 is a vulnerability discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16. It allows authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell. The affected products are 'tzlxJJ' and 'tzlxJK'. The vulnerability has a base severity rating of HIGH, with a base score of 8.8 according to the NVD. The exploitability score is 2.8, indicating a medium level of difficulty for exploitation. The potential danger posed by this vulnerability is high, with impacts on confidentiality, integrity, and availability. To remediate the issue, it is recommended to update the affected products to versions 3.25 or higher for EPG version 3.x, and versions 2.16 or higher for EPG version 2.x.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2022-47531 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options