CVE-2022-38355

Description

Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to attackers with access to the local area network (LAN) to disclose sensitive information stored by the affected product without requiring authentication.

Remediation

Solution:

  • Daikin Holdings Singapore Pte Ltd. has released an update that will automatically install if the SVM controller is enabled. No user operation is required.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.05%
Third-Party Advisory cisa.gov
Affected: Daikin SVMPC1
Affected: Daikin SVMPC2
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-02 third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2022-38355?
CVE-2022-38355 has been scored as a high severity vulnerability.
How to fix CVE-2022-38355?
To fix CVE-2022-38355: Daikin Holdings Singapore Pte Ltd. has released an update that will automatically install if the SVM controller is enabled. No user operation is required.
Is CVE-2022-38355 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-38355 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-38355?
CVE-2022-38355 affects Daikin SVMPC1 , Daikin SVMPC2.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.