Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-33139
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | Cerberus DMS |
Version: All versions |
||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T08:01:20.028Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cerberus DMS", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { product: "Desigo CC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { product: "Desigo CC Compact", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { product: "SIMATIC WinCC OA V3.16", vendor: "Siemens", versions: [ { status: "affected", version: "All versions in default configuration", }, ], }, { product: "SIMATIC WinCC OA V3.17", vendor: "Siemens", versions: [ { status: "affected", version: "All versions in non-default configuration", }, ], }, { product: "SIMATIC WinCC OA V3.18", vendor: "Siemens", versions: [ { status: "affected", version: "All versions in non-default configuration", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-603", description: "CWE-603: Use of Client-Side Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-11T00:00:00", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2022-33139", datePublished: "2022-06-21T00:00:00", dateReserved: "2022-06-13T00:00:00", dateUpdated: "2024-08-03T08:01:20.028Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-33139\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2022-06-21T13:15:08.537\",\"lastModified\":\"2024-11-21T07:07:35.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en Cerberus DMS (Todas las versiones), Desigo CC (Todas las versiones), Desigo CC Compact (Todas las versiones), SIMATIC WinCC OA V3.16 (Todas las versiones en configuración por defecto), SIMATIC WinCC OA V3.17 (Todas las versiones en configuración no por defecto), SIMATIC WinCC OA V3.18 (Todas las versiones en configuración no por defecto). Las aplicaciones afectadas utilizan sólo la autenticación del lado del cliente, cuando no están habilitadas ni la autenticación del lado del servidor (SSA) ni la autenticación Kerberos. En esta configuración, los atacantes podrían suplantar a otros usuarios o explotar el protocolo cliente-servidor sin ser autenticados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-603\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:cerberus_dms:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA0ADD9-466C-4F8F-B50E-95D8691C5083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:desigo_cc:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D75ECA-E171-42BD-A475-A1DD4B9BE013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:desigo_cc_compact:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CACBBE44-9869-4765-B55D-5A020CC56E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc_open_architecture:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE1A893-29AC-495A-9A8D-55EDCC7662C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc_open_architecture:3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C1C682-0F47-48F8-A926-555F21268DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc_open_architecture:3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05BB025B-E479-44BD-A8C7-9ABE52EF8288\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
var-202206-1494
Vulnerability from variot
A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. Siemens' wincc open architecture contains a vulnerability related to the use of client-side authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1494", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "desigo cc", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "wincc open architecture", scope: "eq", trust: 1, vendor: "siemens", version: "3.18", }, { model: "cerberus dms", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "desigo cc compact", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "wincc open architecture", scope: "eq", trust: 1, vendor: "siemens", version: "3.17", }, { model: "wincc open architecture", scope: "eq", trust: 1, vendor: "siemens", version: "3.16", }, { model: "wincc open architecture", scope: "eq", trust: 0.8, vendor: "シーメンス", version: "3.16", }, { model: "wincc open architecture", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "wincc open architecture", scope: "eq", trust: 0.8, vendor: "シーメンス", version: "3.18", }, { model: "wincc open architecture", scope: "eq", trust: 0.8, vendor: "シーメンス", version: null, }, { model: "wincc open architecture", scope: "eq", trust: 0.8, vendor: "シーメンス", version: "3.17", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Siemens reported this vulnerability to CISA.", sources: [ { db: "CNNVD", id: "CNNVD-202206-2079", }, ], trust: 0.6, }, cve: "CVE-2022-33139", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "CVE-2022-33139", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.9, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-33139", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2022-33139", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-33139", trust: 1, value: "CRITICAL", }, { author: "NVD", id: "CVE-2022-33139", trust: 0.8, value: "Critical", }, { author: "CNNVD", id: "CNNVD-202206-2079", trust: 0.6, value: "CRITICAL", }, { author: "VULMON", id: "CVE-2022-33139", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2022-33139", }, { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "CNNVD", id: "CNNVD-202206-2079", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. Siemens' wincc open architecture contains a vulnerability related to the use of client-side authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", sources: [ { db: "NVD", id: "CVE-2022-33139", }, { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "VULMON", id: "CVE-2022-33139", }, ], trust: 1.71, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-33139", trust: 3.3, }, { db: "SIEMENS", id: "SSA-111512", trust: 2.5, }, { db: "SIEMENS", id: "SSA-836027", trust: 2.5, }, { db: "ICS CERT", id: "ICSA-22-172-06", trust: 1.5, }, { db: "ICS CERT", id: "ICSA-22-286-16", trust: 1.4, }, { db: "JVN", id: "JVNVU99030761", trust: 0.8, }, { db: "JVN", id: "JVNVU92214181", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2022-012332", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2022.3046", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202206-2079", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-33139", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2022-33139", }, { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "CNNVD", id: "CNNVD-202206-2079", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, id: "VAR-202206-1494", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.47500001000000003, }, last_update_date: "2024-08-14T12:36:49.207000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Siemens SIMATIC WinCC OA Remediation measures for authorization problem vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=210287", }, ], sources: [ { db: "CNNVD", id: "CNNVD-202206-2079", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-287", trust: 1, }, { problemtype: "CWE-603", trust: 1, }, { problemtype: "Using client-side authentication (CWE-603) [ others ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.5, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { trust: 2.5, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu99030761/", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu92214181/", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-33139", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-06", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/simatic-wincc-oa-privilege-escalation-via-client-side-authentication-38638", }, { trust: 0.6, url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-286-16", }, { trust: 0.6, url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-172-06", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3046", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-33139/", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/603.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-06", }, ], sources: [ { db: "VULMON", id: "CVE-2022-33139", }, { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "CNNVD", id: "CNNVD-202206-2079", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2022-33139", }, { db: "JVNDB", id: "JVNDB-2022-012332", }, { db: "CNNVD", id: "CNNVD-202206-2079", }, { db: "NVD", id: "CVE-2022-33139", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-06-21T00:00:00", db: "VULMON", id: "CVE-2022-33139", }, { date: "2023-08-29T00:00:00", db: "JVNDB", id: "JVNDB-2022-012332", }, { date: "2022-06-21T00:00:00", db: "CNNVD", id: "CNNVD-202206-2079", }, { date: "2022-06-21T13:15:08.537000", db: "NVD", id: "CVE-2022-33139", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-10-11T00:00:00", db: "VULMON", id: "CVE-2022-33139", }, { date: "2023-08-29T08:02:00", db: "JVNDB", id: "JVNDB-2022-012332", }, { date: "2022-10-14T00:00:00", db: "CNNVD", id: "CNNVD-202206-2079", }, { date: "2024-02-13T17:21:45.563000", db: "NVD", id: "CVE-2022-33139", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202206-2079", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Siemens' wincc open architecture Vulnerability related to the use of client-side authentication in", sources: [ { db: "JVNDB", id: "JVNDB-2022-012332", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "authorization issue", sources: [ { db: "CNNVD", id: "CNNVD-202206-2079", }, ], trust: 0.6, }, }
icsa-22-286-16
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens", summary: "reporting this vulnerability to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.", title: "Risk evaluation", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target this vulnerability.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-836027.json", }, { category: "self", summary: "ICS Advisory ICSA-22-286-16 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-286-16.json", }, { category: "self", summary: "ICS Advisory ICSA-22-286-16 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-836027.txt", }, ], title: "Siemens Desigo CC and Cerberus DMS", tracking: { current_release_date: "2022-10-13T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-286-16", initial_release_date: "2022-10-13T00:00:00.000000Z", revision_history: [ { date: "2022-10-13T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Cerberus DMS", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "Cerberus DMS", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Desigo CC", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "Desigo CC", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Desigo CC Compact", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "Desigo CC Compact", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2022-33139", cwe: { id: "CWE-603", name: "Use of Client-Side Authentication", }, notes: [ { category: "summary", text: "Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled.\n\nIn this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33139", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "See \nhttps://support.industry.siemens.com/cs/ww/en/view/109813389/ for a list of specific mitigations", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "none_available", details: "Currently no fix is available", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "mitigation", details: "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2022-33139", }, ], }
ICSA-22-172-06
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { names: [ "Daniel dos Santos", "Jos Wetzels", ], organization: "Forecout Technologies", summary: "reporting this vulnerability to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.", title: "Risk evaluation", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target this vulnerability.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-111512.json", }, { category: "self", summary: "ICS Advisory ICSA-22-172-06 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-172-06.json", }, { category: "self", summary: "ICS Advisory ICSA-22-172-06 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-06", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-111512.txt", }, ], title: "Siemens WinCC OA", tracking: { current_release_date: "2022-06-21T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-172-06", initial_release_date: "2022-06-21T00:00:00.000000Z", revision_history: [ { date: "2022-06-21T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "All versions in default configuration", product: { name: "SIMATIC WinCC OA V3.16", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.16", }, { branches: [ { category: "product_version_range", name: "All versions in non-default configuration", product: { name: "SIMATIC WinCC OA V3.17", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.17", }, { branches: [ { category: "product_version_range", name: "All versions in non-default configuration", product: { name: "SIMATIC WinCC OA V3.18", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.18", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2022-33139", cwe: { id: "CWE-603", name: "Use of Client-Side Authentication", }, notes: [ { category: "summary", text: "Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled.\n\nIn this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.16", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v316-1.html", }, { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.17", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v317.html", }, { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.18", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v318.html", }, { summary: "CVE-2022-33139 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2022-33139.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33139", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Enable server-side authentication (SSA) or Kerberos authentication for your WinCC OA project", product_ids: [ "CSAFPID-0001", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v316-1.html", }, { category: "vendor_fix", details: "Ensure that server-side authentication (SSA) is enabled for your WinCC OA project (which is the default configuration); alternatively enable Kerberos authentication", product_ids: [ "CSAFPID-0002", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v317.html", }, { category: "vendor_fix", details: "Ensure that server-side authentication (SSA) is enabled for your WinCC OA project (which is the default configuration); alternatively enable Kerberos authentication", product_ids: [ "CSAFPID-0003", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v318.html", }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2022-33139", }, ], }
ICSA-22-286-16
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens", summary: "reporting this vulnerability to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.", title: "Risk evaluation", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target this vulnerability.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-836027.json", }, { category: "self", summary: "ICS Advisory ICSA-22-286-16 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-286-16.json", }, { category: "self", summary: "ICS Advisory ICSA-22-286-16 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, { category: "external", summary: "SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-836027.txt", }, ], title: "Siemens Desigo CC and Cerberus DMS", tracking: { current_release_date: "2022-10-13T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-286-16", initial_release_date: "2022-10-13T00:00:00.000000Z", revision_history: [ { date: "2022-10-13T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Cerberus DMS", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "Cerberus DMS", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Desigo CC", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "Desigo CC", }, { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "Desigo CC Compact", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "Desigo CC Compact", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2022-33139", cwe: { id: "CWE-603", name: "Use of Client-Side Authentication", }, notes: [ { category: "summary", text: "Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled.\n\nIn this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33139", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "See \nhttps://support.industry.siemens.com/cs/ww/en/view/109813389/ for a list of specific mitigations", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "none_available", details: "Currently no fix is available", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "mitigation", details: "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2022-33139", }, ], }
icsa-22-172-06
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { names: [ "Daniel dos Santos", "Jos Wetzels", ], organization: "Forecout Technologies", summary: "reporting this vulnerability to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.", title: "Risk evaluation", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target this vulnerability.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-111512.json", }, { category: "self", summary: "ICS Advisory ICSA-22-172-06 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-172-06.json", }, { category: "self", summary: "ICS Advisory ICSA-22-172-06 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-172-06", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { category: "external", summary: "SSA-111512: Client-side Authentication in SIMATIC WinCC OA - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-111512.txt", }, ], title: "Siemens WinCC OA", tracking: { current_release_date: "2022-06-21T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-172-06", initial_release_date: "2022-06-21T00:00:00.000000Z", revision_history: [ { date: "2022-06-21T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "All versions in default configuration", product: { name: "SIMATIC WinCC OA V3.16", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.16", }, { branches: [ { category: "product_version_range", name: "All versions in non-default configuration", product: { name: "SIMATIC WinCC OA V3.17", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.17", }, { branches: [ { category: "product_version_range", name: "All versions in non-default configuration", product: { name: "SIMATIC WinCC OA V3.18", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "SIMATIC WinCC OA V3.18", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2022-33139", cwe: { id: "CWE-603", name: "Use of Client-Side Authentication", }, notes: [ { category: "summary", text: "Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled.\n\nIn this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.16", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v316-1.html", }, { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.17", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v317.html", }, { summary: "CVE-2022-33139 - SIMATIC WinCC OA V3.18", url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v318.html", }, { summary: "CVE-2022-33139 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2022-33139.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33139", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Enable server-side authentication (SSA) or Kerberos authentication for your WinCC OA project", product_ids: [ "CSAFPID-0001", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v316-1.html", }, { category: "vendor_fix", details: "Ensure that server-side authentication (SSA) is enabled for your WinCC OA project (which is the default configuration); alternatively enable Kerberos authentication", product_ids: [ "CSAFPID-0002", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v317.html", }, { category: "vendor_fix", details: "Ensure that server-side authentication (SSA) is enabled for your WinCC OA project (which is the default configuration); alternatively enable Kerberos authentication", product_ids: [ "CSAFPID-0003", ], url: "https://www.winccoa.com/downloads/detail/security-guideline-wincc-oa-v318.html", }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2022-33139", }, ], }
fkie_cve-2022-33139
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
siemens | cerberus_dms | * | |
siemens | desigo_cc | * | |
siemens | desigo_cc_compact | * | |
siemens | wincc_open_architecture | 3.16 | |
siemens | wincc_open_architecture | 3.17 | |
siemens | wincc_open_architecture | 3.18 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:cerberus_dms:*:*:*:*:*:*:*:*", matchCriteriaId: "9AA0ADD9-466C-4F8F-B50E-95D8691C5083", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:desigo_cc:*:*:*:*:*:*:*:*", matchCriteriaId: "90D75ECA-E171-42BD-A475-A1DD4B9BE013", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:desigo_cc_compact:*:*:*:*:*:*:*:*", matchCriteriaId: "CACBBE44-9869-4765-B55D-5A020CC56E3B", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.16:*:*:*:*:*:*:*", matchCriteriaId: "DFE1A893-29AC-495A-9A8D-55EDCC7662C1", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.17:*:*:*:*:*:*:*", matchCriteriaId: "20C1C682-0F47-48F8-A926-555F21268DF3", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.18:*:*:*:*:*:*:*", matchCriteriaId: "05BB025B-E479-44BD-A8C7-9ABE52EF8288", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en Cerberus DMS (Todas las versiones), Desigo CC (Todas las versiones), Desigo CC Compact (Todas las versiones), SIMATIC WinCC OA V3.16 (Todas las versiones en configuración por defecto), SIMATIC WinCC OA V3.17 (Todas las versiones en configuración no por defecto), SIMATIC WinCC OA V3.18 (Todas las versiones en configuración no por defecto). Las aplicaciones afectadas utilizan sólo la autenticación del lado del cliente, cuando no están habilitadas ni la autenticación del lado del servidor (SSA) ni la autenticación Kerberos. En esta configuración, los atacantes podrían suplantar a otros usuarios o explotar el protocolo cliente-servidor sin ser autenticados", }, ], id: "CVE-2022-33139", lastModified: "2024-11-21T07:07:35.323", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-06-21T13:15:08.537", references: [ { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-603", }, ], source: "productcert@siemens.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
gsd-2022-33139
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-33139", description: "A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", id: "GSD-2022-33139", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-33139", ], details: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", id: "GSD-2022-33139", modified: "2023-12-13T01:19:23.086585Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "productcert@siemens.com", ID: "CVE-2022-33139", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cerberus DMS", version: { version_data: [ { version_value: "All versions", }, ], }, }, { product_name: "Desigo CC", version: { version_data: [ { version_value: "All versions", }, ], }, }, { product_name: "Desigo CC Compact", version: { version_data: [ { version_value: "All versions", }, ], }, }, { product_name: "SIMATIC WinCC OA V3.16", version: { version_data: [ { version_value: "All versions in default configuration", }, ], }, }, { product_name: "SIMATIC WinCC OA V3.17", version: { version_data: [ { version_value: "All versions in non-default configuration", }, ], }, }, { product_name: "SIMATIC WinCC OA V3.18", version: { version_data: [ { version_value: "All versions in non-default configuration", }, ], }, }, ], }, vendor_name: "Siemens", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-603: Use of Client-Side Authentication", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", refsource: "MISC", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", refsource: "MISC", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:cerberus_dms:*:*:*:*:*:*:*:*", matchCriteriaId: "9AA0ADD9-466C-4F8F-B50E-95D8691C5083", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:desigo_cc:*:*:*:*:*:*:*:*", matchCriteriaId: "90D75ECA-E171-42BD-A475-A1DD4B9BE013", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:desigo_cc_compact:*:*:*:*:*:*:*:*", matchCriteriaId: "CACBBE44-9869-4765-B55D-5A020CC56E3B", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.16:*:*:*:*:*:*:*", matchCriteriaId: "DFE1A893-29AC-495A-9A8D-55EDCC7662C1", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.17:*:*:*:*:*:*:*", matchCriteriaId: "20C1C682-0F47-48F8-A926-555F21268DF3", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:wincc_open_architecture:3.18:*:*:*:*:*:*:*", matchCriteriaId: "05BB025B-E479-44BD-A8C7-9ABE52EF8288", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en Cerberus DMS (Todas las versiones), Desigo CC (Todas las versiones), Desigo CC Compact (Todas las versiones), SIMATIC WinCC OA V3.16 (Todas las versiones en configuración por defecto), SIMATIC WinCC OA V3.17 (Todas las versiones en configuración no por defecto), SIMATIC WinCC OA V3.18 (Todas las versiones en configuración no por defecto). Las aplicaciones afectadas utilizan sólo la autenticación del lado del cliente, cuando no están habilitadas ni la autenticación del lado del servidor (SSA) ni la autenticación Kerberos. En esta configuración, los atacantes podrían suplantar a otros usuarios o explotar el protocolo cliente-servidor sin ser autenticados", }, ], id: "CVE-2022-33139", lastModified: "2024-02-13T17:21:45.563", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-06-21T13:15:08.537", references: [ { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-603", }, ], source: "productcert@siemens.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }, }, }, }
ghsa-28c6-247x-r9mw
Vulnerability from github
A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.
{ affected: [], aliases: [ "CVE-2022-33139", ], database_specific: { cwe_ids: [ "CWE-287", "CWE-603", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-06-21T13:15:00Z", severity: "CRITICAL", }, details: "A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", id: "GHSA-28c6-247x-r9mw", modified: "2022-06-30T00:00:40Z", published: "2022-06-22T00:00:55Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-33139", }, { type: "WEB", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf", }, { type: "WEB", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-836027.pdf", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.