<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2022-4986 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2022-4986/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 22:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2022-4986/feed.xml" rel="self" type="application/rss+xml"/><item><title>Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hirschmann-dos/</link><pubDate>Thu, 02 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hirschmann-dos/</guid><description>Hirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.</description><content:encoded><![CDATA[<p>Hirschmann EagleSDV devices are susceptible to a denial-of-service vulnerability, identified as CVE-2022-4986. This vulnerability allows an attacker to crash the device by establishing TLS sessions using the outdated TLS 1.0 or TLS 1.1 protocols. Successful exploitation results in service unavailability, impacting network operations reliant on the affected device. The vulnerability stems from improper handling of older TLS versions during session establishment. Given the critical role EagleSDV devices play in network infrastructure, this vulnerability poses a significant risk to organizations that have not yet patched their systems or disabled the deprecated protocols.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Hirschmann EagleSDV device accessible over the network.</li>
<li>The attacker crafts a TLS connection request using TLS 1.0.</li>
<li>The attacker sends the crafted TLS 1.0 connection request to the target EagleSDV device.</li>
<li>The EagleSDV device attempts to process the TLS 1.0 handshake.</li>
<li>Due to the vulnerability, the device encounters an error during the session establishment phase of the TLS handshake.</li>
<li>This error leads to uncontrolled resource consumption (CWE-400) within the device&rsquo;s TLS processing module.</li>
<li>The resource exhaustion causes the device&rsquo;s operating system to become unstable.</li>
<li>The device crashes, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-4986 leads to a denial-of-service condition on the affected Hirschmann EagleSDV device. This can disrupt network services and cause downtime. The number of affected devices and sectors is unknown, but the impact could be significant for organizations relying on these devices for critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Disable TLS 1.0 and TLS 1.1 on all Hirschmann EagleSDV devices to mitigate the vulnerability described in CVE-2022-4986.</li>
<li>Monitor network traffic for attempts to establish TLS connections using TLS 1.0 and TLS 1.1 to identify potential exploitation attempts using a network monitoring solution (network_connection log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>cve-2022-4986</category><category>network-device</category></item></channel></rss>