CVE-2022-50975
Published: 02 February 2026
Summary
CVE-2022-50975 is a high-severity Origin Validation Error (CWE-346) vulnerability in Innomic (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and SC-23 (Session Authenticity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Protects the authenticity of communications sessions, directly preventing unauthenticated attackers from hijacking and reusing stolen session IDs.
Authorizes, monitors, and controls remote access including Ethernet configuration interfaces, blocking unauthenticated remote exploitation.
Enforces timely session termination after defined events, reducing the opportunity for attackers to exploit existing session IDs.
NVD Description
An unauthenticated remote attacker is able to use an existing session id of a logged in user and gain full access to the device if configuration via ethernet is enabled.
Deeper analysisAI
CVE-2022-50975 is a vulnerability that enables an unauthenticated remote attacker to leverage an existing session ID from a logged-in user to obtain full access to the affected device, provided configuration via Ethernet is enabled. The issue is associated with products from Innomic, as outlined in their security advisories, and is classified under CWE-346 (Origin Validation Error). It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, no privileges required, and user interaction needed.
An unauthenticated remote attacker can exploit this vulnerability by acquiring a valid session ID belonging to a legitimate user, potentially through social engineering or other means that involve user interaction. Successful exploitation grants the attacker complete control over the device, resulting in high impacts on confidentiality, integrity, and availability.
Innomic has published advisories detailing the issue, available at https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html and https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json, which security practitioners should consult for specific mitigation guidance and patches. The CVE was published on 2026-02-02T15:16:27.933.
Details
- CWE(s)