Vulnerabilites related to siemens - 7kg8551-0aa01-0aa0
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no restringen el acceso no autenticado a determinadas p\u00e1ginas de la interfaz web. Esto podr\u00eda permitir a un atacante eliminar archivos de registro sin autenticaci\u00f3n" } ], "id": "CVE-2022-29883", "lastModified": "2024-11-21T06:59:54.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.430", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no manejan correctamente la entrada de un par\u00e1metro de petici\u00f3n GET. El argumento proporcionado es reflejado directamente en la respuesta del servidor web. Esto podr\u00eda permitir a un atacante no autenticado llevar a cabo ataques de tipo XSS reflejados" } ], "id": "CVE-2022-29876", "lastModified": "2024-11-21T06:59:52.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.083", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). La interfaz de administraci\u00f3n basada en la web de los dispositivos afectados no emplea una protecci\u00f3n de acceso especial para determinadas visualizaciones internas del desarrollador. Esto podr\u00eda permitir a los usuarios autenticados acceder a informaci\u00f3n cr\u00edtica del dispositivo" } ], "id": "CVE-2022-29879", "lastModified": "2024-11-21T06:59:53.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.227", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no manejan correctamente los archivos cargados. Un atacante no autenticado podr\u00eda aprovechar esta situaci\u00f3n para almacenar un ataque de tipo XSS, que podr\u00eda -cuando un usuario leg\u00edtimo accede a los registros de error- llevar a cabo acciones arbitrarias en nombre del usuario" } ], "id": "CVE-2022-29882", "lastModified": "2024-11-21T06:59:53.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.377", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no comprueban correctamente los par\u00e1metros de las peticiones POST. Esto podr\u00eda permitir a un atacante autenticado poner el dispositivo en un estado de denegaci\u00f3n de servicio o controlar el contador del programa y, por tanto, ejecutar c\u00f3digo arbitrario en el dispositivo" } ], "id": "CVE-2022-29872", "lastModified": "2024-11-21T06:59:51.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:15.927", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-141" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no cifran el tr\u00e1fico web con los clientes, sino que son comunicados en texto sin cifrar por medio de HTTP. Esto podr\u00eda permitir a un atacante no autenticado capturar el tr\u00e1fico e interferir con la funcionalidad del dispositivo" } ], "id": "CVE-2022-29874", "lastModified": "2024-11-21T06:59:52.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.030", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). La interfaz de administraci\u00f3n basada en la web de los dispositivos afectados no emplea una protecci\u00f3n de acceso especial para determinadas vistas internas del desarrollador. Esto podr\u00eda permitir a usuarios no autenticados extraer detalles de la configuraci\u00f3n interna" } ], "id": "CVE-2022-29881", "lastModified": "2024-11-21T06:59:53.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.327", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED9E3266-C2B1-4BF8-BD85-A53B578C28EA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AC2E2A-120E-46CE-98D3-FED9DFF5567E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1617C70-F7E5-40E1-818F-7D378FE52946", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "842F8224-91E4-4A46-8B8D-FAE4C62DA5AA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D4FAC0-BE16-41D3-A75E-D1B387002C28", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EB5EE36-C719-4B4C-9C89-99029684C111", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C533267-8035-4D8D-AAEC-D380E1B61F27", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7175602C-F09F-47B9-8525-A172E3A6339C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2FFE599-3D20-4F1D-BC8D-223D9EB3805C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21861CFA-AAD5-4382-AA71-5570C67E1755", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF71CAB4-73CA-44C6-8EA6-04FE06B0E5B9", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5A40293-661E-4BBA-9595-15BA4509B9CC", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A5C1943-9238-4F2C-89A9-CBFD890287AC", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D04E50C-903C-4891-87A5-322011615313", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99ADC931-0F6C-4E7E-B01E-CB9620E1DB22", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F575213C-FF77-491B-9B7B-F27BE5179E5F", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F4CD9C-6EF5-4A74-9C7F-4C493412D10B", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57717042-B290-4CBF-A05D-FDCCAA32348B", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F7930A2-1E8F-486D-8A6C-95FF9ECF389E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "278B56FB-A468-4FE6-AC78-37C2ED56BB30", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B87B77-BE44-4CB8-A751-D80F266A5B3A", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14E48E5C-7D31-4CF9-AE7D-CE9D883479D4", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A520311-63DC-4CC5-9122-9F4AA490247C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "123EE83F-40FE-454A-9C11-9FEC9839C7C2", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54940148-E39F-4621-ACD3-D23222EBCA0E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3CC8D36-0600-4542-BC96-CCC2AE207BDA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FC14D08-780A-4786-9961-E53B5C328409", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F99757B4-A330-4B30-8EB9-B6D0A01A34F3", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "046BF95B-37B9-4FB1-93E8-7A220F021F3A", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D0E330-3D1C-4FE0-B547-CADC8D27B959", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B701236-66F4-4935-8D5B-2E7C5CDAE8A7", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94A3FD7E-92DA-4424-93F8-AD3FB0B7E7D5", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1107CC34-F942-4508-A8F8-6C1E8720C376", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96E0C729-5160-48EE-8C45-967191229DAF", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657581FD-6E0B-4B78-994D-535E562D1745", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE8F0DA-056D-4380-9B67-E4833239A063", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices do not properly validate the parameter of a specific GET request. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10). Los dispositivos afectados no comprueban apropiadamente el par\u00e1metro de una petici\u00f3n GET espec\u00edfica. Esto podr\u00eda permitir a un atacante autenticado poner el dispositivo en un estado de denegaci\u00f3n de servicio o controlar el contador del programa y, por tanto, ejecutar c\u00f3digo arbitrario en el dispositivo" } ], "id": "CVE-2022-41665", "lastModified": "2024-11-21T07:23:35.857", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-11T11:15:11.057", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-141" } ], "source": "productcert@siemens.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no comprueban correctamente los par\u00e1metros de determinadas peticiones GET y POST. Esto podr\u00eda permitir a un atacante no autenticado poner el dispositivo en un estado de denegaci\u00f3n de servicio o controlar el contador del programa y, por tanto, ejecutar c\u00f3digo arbitrario en el dispositivo" } ], "id": "CVE-2022-29873", "lastModified": "2024-11-21T06:59:52.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:15.977", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-141" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados usan un rango limitado para los desaf\u00edos que son env\u00edan durante una comunicaci\u00f3n desaf\u00edo-respuesta no cifrada. Un atacante no autenticado podr\u00eda capturar un par desaf\u00edo-respuesta v\u00e1lido generado por un usuario leg\u00edtimo, y solicitar la p\u00e1gina web repetidamente para esperar que vuelva a aparecer el mismo desaf\u00edo para el que sea conocida la respuesta correcta. Esto podr\u00eda permitir al atacante acceder a la interfaz de administraci\u00f3n del dispositivo" } ], "id": "CVE-2022-29878", "lastModified": "2024-11-21T06:59:53.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.177", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados permiten el acceso no autenticado al \u00e1rea de configuraci\u00f3n de la interfaz web. Esto podr\u00eda permitir a un atacante extraer detalles de configuraci\u00f3n interna o reconfigurar los ajustes de red. Sin embargo, los ajustes reconfigurados no pueden ser activados a menos que el papel de un usuario administrador autenticado" } ], "id": "CVE-2022-29877", "lastModified": "2024-11-21T06:59:52.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.130", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED9E3266-C2B1-4BF8-BD85-A53B578C28EA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AC2E2A-120E-46CE-98D3-FED9DFF5567E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1617C70-F7E5-40E1-818F-7D378FE52946", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "842F8224-91E4-4A46-8B8D-FAE4C62DA5AA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11D4FAC0-BE16-41D3-A75E-D1B387002C28", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EB5EE36-C719-4B4C-9C89-99029684C111", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C533267-8035-4D8D-AAEC-D380E1B61F27", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7175602C-F09F-47B9-8525-A172E3A6339C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2FFE599-3D20-4F1D-BC8D-223D9EB3805C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21861CFA-AAD5-4382-AA71-5570C67E1755", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF71CAB4-73CA-44C6-8EA6-04FE06B0E5B9", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5A40293-661E-4BBA-9595-15BA4509B9CC", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A5C1943-9238-4F2C-89A9-CBFD890287AC", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D04E50C-903C-4891-87A5-322011615313", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99ADC931-0F6C-4E7E-B01E-CB9620E1DB22", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F575213C-FF77-491B-9B7B-F27BE5179E5F", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F4CD9C-6EF5-4A74-9C7F-4C493412D10B", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57717042-B290-4CBF-A05D-FDCCAA32348B", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F7930A2-1E8F-486D-8A6C-95FF9ECF389E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "278B56FB-A468-4FE6-AC78-37C2ED56BB30", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B87B77-BE44-4CB8-A751-D80F266A5B3A", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14E48E5C-7D31-4CF9-AE7D-CE9D883479D4", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A520311-63DC-4CC5-9122-9F4AA490247C", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "123EE83F-40FE-454A-9C11-9FEC9839C7C2", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54940148-E39F-4621-ACD3-D23222EBCA0E", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3CC8D36-0600-4542-BC96-CCC2AE207BDA", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FC14D08-780A-4786-9961-E53B5C328409", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F99757B4-A330-4B30-8EB9-B6D0A01A34F3", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "046BF95B-37B9-4FB1-93E8-7A220F021F3A", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D0E330-3D1C-4FE0-B547-CADC8D27B959", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B701236-66F4-4935-8D5B-2E7C5CDAE8A7", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94A3FD7E-92DA-4424-93F8-AD3FB0B7E7D5", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1107CC34-F942-4508-A8F8-6C1E8720C376", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96E0C729-5160-48EE-8C45-967191229DAF", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657581FD-6E0B-4B78-994D-535E562D1745", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE8F0DA-056D-4380-9B67-E4833239A063", "versionEndExcluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user\u0027s session after login." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3.10), SICAM P850 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3. 10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10), SICAM P855 (Todas las versiones anteriores a V3.10). Los dispositivos afectados aceptan las cookies de sesi\u00f3n definidas por el usuario y no renuevan la cookie de sesi\u00f3n despu\u00e9s de iniciar o cerrar la sesi\u00f3n. Esto podr\u00eda permitir a un atacante tomar el control de la sesi\u00f3n de otro usuario despu\u00e9s del inicio de sesi\u00f3n" } ], "id": "CVE-2022-40226", "lastModified": "2024-11-21T07:21:06.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-11T11:15:10.883", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29D23CC1-B5EA-4088-8552-6BD00DE6DABC", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "19E9E75A-266E-42F4-A978-1881CFB775D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B7A11-AE03-4EDD-B446-CFAE7B83A405", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4676DE8-BCA3-48AF-B90F-6F4331FDD77B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8F3D9-37A0-4DFD-8131-1664893C2D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F64393-39B7-49DE-8F50-73E7A5DBAB61", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5450BA3D-61FE-46EA-AD56-D04D3809D23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5665988-B892-4C16-837A-DA5D1A1FD241", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE1C19C0-3092-4AB8-A131-3284D3CF0A00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A41D5D-D9CE-4436-92E1-87DFE46E703A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC17FD2-8B3B-4331-A0E2-991A0C92E119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F555FCD5-A377-4505-9EB9-83D1FC0BA005", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAA2339-0C00-4551-958E-76E34DF50F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "209B2BF5-0023-4F35-9E1A-5F271A026FA1", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC103BEB-FD72-4BCF-8450-8F753986284E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81CA2D85-1A58-42FB-BD06-F2E236808890", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB09DC-2493-4680-A718-847A9F3916C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D62E4F9-7230-496D-A00A-AB71EC9F56B6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "83646A62-58E8-47B3-A3E2-9052A223BA3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "835E6B3A-D357-478D-AC74-1FB0BF1FB48B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DA971B-28EA-4443-B546-CE066DE5A611", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC8905ED-8C17-42A3-BB22-95F572A2CD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90528A32-4827-4A29-8E54-0DBCEF141183", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "513D4A78-6F4B-421F-BA56-40FF32E12692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BECCF69-B791-4F97-94B6-150A52A22543", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A0038B-F453-4530-A681-F37AADF797A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8D9B433-4F5F-4C63-B16C-047186B726F5", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "624701F6-0F97-4A83-A329-38310EA7ABAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93845620-72CC-4C54-BF5C-9E9A9DD0439F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81F629C-DF39-43F0-AEB9-F66CFCB29E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178FF49-6E30-47D7-892F-1121288E7E8B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2A92F-04A9-46BC-B334-DB06F55614A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7E21CE9-87D8-4D20-B343-48AF64E7049D", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80D60C5-AF37-4498-919E-CB6589286B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3C6DE9-9980-46E6-9468-F8167D5CF692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B02F4EC-85D5-442E-B71C-A9CA9C3854F6", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C94271C-DAD2-4C53-A701-93A542A3B154", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E24F48D-DC93-4126-8830-A7662AAA87CD", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63C21B33-EC43-450A-8F33-0948DD07525B", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF24A81-2063-4DAB-B6E4-2546042A553C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A402337A-B4A8-4F8D-B826-2EE714864C01", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "15554D33-7C32-44E6-B16E-D0A5AC903E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6FE0DFE-B877-4E07-9A9C-8AC24259240F", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "34B32039-505A-4815-967B-D11F4D337CE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DCF2749-986F-4735-96E8-749E625CAD6A", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E74BAD6-218E-477C-B2C2-CE0E578A2400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7558F27-235F-47B8-9D65-944BF1C92DDF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE65771-9A0E-48AF-A9FE-4705698C8997", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB551BB-4C46-4FA0-B9EF-C70583D02993", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "9710DFFE-974F-4A82-9E85-3311D84A951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF385121-4F72-4EE3-9EC3-BC9B910E74BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F882A2-DFFB-4A07-8F62-E52068EDCC35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83A63834-D7F7-4112-9C03-AF64EA254B35", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93C0DE4-4FE9-4C19-AD4A-805910DD9682", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C9F3057-5918-4331-863A-46A4FA292F8E", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "949B5448-5CCA-45A4-8D6B-8FB70EF42A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFF3159-7FCF-4ACC-B06A-EB6414E01307", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "634DEE3C-5BB9-446B-A0FD-95764C0B0461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC81665F-2064-4F85-88BF-5A3F46178CBE", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "468D2956-6D5C-48C6-B0C9-868CC9DEA8D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "274D904F-D09A-4038-97FE-464BBE97A93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "976E3302-C339-4057-A0DD-EF40A9A501F4", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "7923FD73-F2FA-4B60-A1E3-F7C4D586269B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4EF031-920F-4F69-B25A-779ACA4046B8", "versionEndExcluding": "3.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FBA5B-E455-4E07-B39C-70AEE0C26EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados no comprueban correctamente la entrada en la interfaz de configuraci\u00f3n. Esto podr\u00eda permitir a un atacante autenticado realizar ataques de tipo XSS persistentes para llevar a cabo acciones arbitrarias en nombre de un usuario registrado que acceda a las visualizaciones afectadas" } ], "id": "CVE-2022-29880", "lastModified": "2024-11-21T06:59:53.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-20T13:15:16.280", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-29878 (GCVE-0-2022-29878)
Vulnerability from cvelistv5
- CWE-294 - Authentication Bypass by Capture-replay
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294: Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:22", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-294: Authentication Bypass by Capture-replay" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29878", "datePublished": "2022-05-10T09:47:22", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-40226 (GCVE-0-2022-40226)
Vulnerability from cvelistv5
- CWE-384 - Session Fixation
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.10 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-40226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T15:22:43.267983Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-21T13:48:13.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user\u0027s session after login." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T08:16:48.951Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-40226", "datePublished": "2022-10-11T00:00:00.000Z", "dateReserved": "2022-09-08T00:00:00.000Z", "dateUpdated": "2025-04-21T13:48:13.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29881 (GCVE-0-2022-29881)
Vulnerability from cvelistv5
- CWE-306 - Missing Authentication for Critical Function
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:26", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29881", "datePublished": "2022-05-10T09:47:26", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-41665 (GCVE-0-2022-41665)
Vulnerability from cvelistv5
- CWE-141 - Improper Neutralization of Parameter/Argument Delimiters
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.10 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-41665", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T15:10:56.862942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-21T13:48:05.692Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices do not properly validate the parameter of a specific GET request. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-141", "description": "CWE-141: Improper Neutralization of Parameter/Argument Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T08:16:55.403Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-41665", "datePublished": "2022-10-11T00:00:00.000Z", "dateReserved": "2022-09-27T00:00:00.000Z", "dateUpdated": "2025-04-21T13:48:05.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29883 (GCVE-0-2022-29883)
Vulnerability from cvelistv5
- CWE-287 - Improper Authentication
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:29", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29883", "datePublished": "2022-05-10T09:47:29", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29880 (GCVE-0-2022-29880)
Vulnerability from cvelistv5
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:25", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29880", "datePublished": "2022-05-10T09:47:25", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29882 (GCVE-0-2022-29882)
Vulnerability from cvelistv5
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:28", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29882", "datePublished": "2022-05-10T09:47:28", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29872 (GCVE-0-2022-29872)
Vulnerability from cvelistv5
- CWE-141 - Improper Neutralization of Parameter/Argument Delimiters
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-141", "description": "CWE-141: Improper Neutralization of Parameter/Argument Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:15", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-141: Improper Neutralization of Parameter/Argument Delimiters" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29872", "datePublished": "2022-05-10T09:47:15", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29876 (GCVE-0-2022-29876)
Vulnerability from cvelistv5
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:19", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29876", "datePublished": "2022-05-10T09:47:19", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:42.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29879 (GCVE-0-2022-29879)
Vulnerability from cvelistv5
- CWE-306 - Missing Authentication for Critical Function
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:23", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29879", "datePublished": "2022-05-10T09:47:23", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29873 (GCVE-0-2022-29873)
Vulnerability from cvelistv5
- CWE-141 - Improper Neutralization of Parameter/Argument Delimiters
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-141", "description": "CWE-141: Improper Neutralization of Parameter/Argument Delimiters", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:16", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-141: Improper Neutralization of Parameter/Argument Delimiters" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29873", "datePublished": "2022-05-10T09:47:16", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:42.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29877 (GCVE-0-2022-29877)
Vulnerability from cvelistv5
- CWE-306 - Missing Authentication for Critical Function
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:20", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29877", "datePublished": "2022-05-10T09:47:21", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:42.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29874 (GCVE-0-2022-29874)
Vulnerability from cvelistv5
- CWE-319 - Cleartext Transmission of Sensitive Information
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SICAM P850 |
Version: All versions < V3.00 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:18", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29874", "datePublished": "2022-05-10T09:47:18", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202205-0929
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0929", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "NVD", "id": "CVE-2022-29876" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3128" } ], "trust": 0.6 }, "cve": "CVE-2022-29876", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2022-29876", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36395", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-29876", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29876", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-36395", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3128", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "db": "NVD", "id": "CVE-2022-29876" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29876" }, { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "VULMON", "id": "CVE-2022-29876" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29876", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-36395", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3128", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29876", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "VULMON", "id": "CVE-2022-29876" }, { "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "db": "NVD", "id": "CVE-2022-29876" } ] }, "id": "VAR-202205-0929", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" } ] }, "last_update_date": "2024-11-23T21:50:29.839000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332531" }, { "title": "Siemens SICAM Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194233" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "CNNVD", "id": "CNNVD-202205-3128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29876" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29876/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "VULMON", "id": "CVE-2022-29876" }, { "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "db": "NVD", "id": "CVE-2022-29876" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36395" }, { "db": "VULMON", "id": "CVE-2022-29876" }, { "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "db": "NVD", "id": "CVE-2022-29876" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36395" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "date": "2022-05-20T13:15:16.083000", "db": "NVD", "id": "CVE-2022-29876" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36395" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3128" }, { "date": "2024-11-21T06:59:52.710000", "db": "NVD", "id": "CVE-2022-29876" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SICAM P850 and SICAM P855 Devices Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2022-36395" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3128" } ], "trust": 0.6 } }
var-202210-0447
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Session fixation vulnerabilities exist in multiple Siemens products, including firmware.Information may be obtained and information may be tampered with. Siemens SICAM is a comprehensive substation automation system of Siemens (Siemens) in Germany.
Several Siemens products have an access control error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0447", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10" }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "desigo pxm30-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "desigo pxm30.e", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "desigo pxm40-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "desigo pxm40.e", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "desigo pxm50-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "desigo pxm50.e", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "pxg3.w100-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-37" }, { "model": "pxg3.w100-2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" }, { "model": "pxg3.w200-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-37" }, { "model": "pxg3.w200-2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v02.20.126.11-41" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner of Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-501" } ], "trust": 0.6 }, "cve": "CVE-2022-40226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-91618", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-40226", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "id": "CVE-2022-40226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-40226", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-40226", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2022-40226", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-40226", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-91618", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202210-501", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "CNNVD", "id": "CNNVD-202210-501" }, { "db": "NVD", "id": "CVE-2022-40226" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user\u0027s session after login. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Session fixation vulnerabilities exist in multiple Siemens products, including firmware.Information may be obtained and information may be tampered with. Siemens SICAM is a comprehensive substation automation system of Siemens (Siemens) in Germany. \n\r\n\r\nSeveral Siemens products have an access control error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2022-40226" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "CNVD", "id": "CNVD-2022-91618" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-40226", "trust": 3.8 }, { "db": "SIEMENS", "id": "SSA-572005", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-286-09", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU92214181", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018811", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-91618", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.5101.3", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202210-501", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "CNNVD", "id": "CNNVD-202210-501" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "id": "VAR-202210-0447", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" } ], "trust": 1.1823377 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" } ] }, "last_update_date": "2024-08-14T12:23:58.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Access Control Error Vulnerabilities in Multiple Siemens Products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/384501" }, { "title": "Multiple Siemens Product Authorization Issue Vulnerability Fixing Measures", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210583" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "CNNVD", "id": "CNNVD-202210-501" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-384", "trust": 1.0 }, { "problemtype": "Session immobilization (CWE-384) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92214181/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40226" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-09" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-286-09" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-40226/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.5101.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "CNNVD", "id": "CNNVD-202210-501" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-91618" }, { "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "db": "CNNVD", "id": "CNNVD-202210-501" }, { "db": "NVD", "id": "CVE-2022-40226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2022-91618" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "date": "2022-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-501" }, { "date": "2022-10-11T11:15:10.883000", "db": "NVD", "id": "CVE-2022-40226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "CNVD", "id": "CNVD-2022-91618" }, { "date": "2023-10-23T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-018811" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-501" }, { "date": "2023-06-13T09:15:14.680000", "db": "NVD", "id": "CVE-2022-40226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-501" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Session fixation vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018811" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-501" } ], "trust": 0.6 } }
var-202205-0924
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0924", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3119" } ], "trust": 0.6 }, "cve": "CVE-2022-29881", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29881", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36390", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2022-29881", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-29881", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29881", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29881", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36390", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-3119", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29881" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "VULMON", "id": "CVE-2022-29881" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29881", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010134", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36390", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3119", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29881", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "VULMON", "id": "CVE-2022-29881" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "id": "VAR-202205-0924", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" } ] }, "last_update_date": "2024-11-23T21:50:30.221000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Authentication Vulnerability (CNVD-2022-36390)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332561" }, { "title": "Siemens SICAM Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194646" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "CNNVD", "id": "CNNVD-202205-3119" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29881" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29881/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "VULMON", "id": "CVE-2022-29881" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36390" }, { "db": "VULMON", "id": "CVE-2022-29881" }, { "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "db": "NVD", "id": "CVE-2022-29881" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36390" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "date": "2022-05-20T13:15:16.327000", "db": "NVD", "id": "CVE-2022-29881" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36390" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010134" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3119" }, { "date": "2024-11-21T06:59:53.640000", "db": "NVD", "id": "CVE-2022-29881" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3119" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lack of authentication for critical functions in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010134" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3119" } ], "trust": 0.6 } }
var-202205-0926
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0926", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3117" } ], "trust": 0.6 }, "cve": "CVE-2022-29883", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-29883", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-36388", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-29883", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29883", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29883", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29883", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36388", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-3117", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29883" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "VULMON", "id": "CVE-2022-29883" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29883", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010132", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36388", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3117", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29883", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "VULMON", "id": "CVE-2022-29883" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "id": "VAR-202205-0926", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" } ] }, "last_update_date": "2024-11-23T21:50:30.284000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Improper Authentication Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332541" }, { "title": "Siemens SICAM Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=243532" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "CNNVD", "id": "CNNVD-202205-3117" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29883" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29883/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "VULMON", "id": "CVE-2022-29883" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36388" }, { "db": "VULMON", "id": "CVE-2022-29883" }, { "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "db": "NVD", "id": "CVE-2022-29883" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36388" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "date": "2022-05-20T13:15:16.430000", "db": "NVD", "id": "CVE-2022-29883" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36388" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010132" }, { "date": "2023-06-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3117" }, { "date": "2024-11-21T06:59:54", "db": "NVD", "id": "CVE-2022-29883" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3117" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lack of authentication for critical functions in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010132" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3117" } ], "trust": 0.6 } }
var-202205-0927
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30.
A security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. The vulnerability can be exploited by an attacker to store an XSS attack. Do whatever you want. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0927", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3118" } ], "trust": 0.6 }, "cve": "CVE-2022-29882", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2022-29882", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36389", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-29882", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-29882", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29882", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29882", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36389", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3118", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. \n\r\n\r\nA security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. The vulnerability can be exploited by an attacker to store an XSS attack. Do whatever you want. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29882" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "VULMON", "id": "CVE-2022-29882" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29882", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010133", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36389", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3118", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29882", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "VULMON", "id": "CVE-2022-29882" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "id": "VAR-202205-0927", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" } ] }, "last_update_date": "2024-11-23T21:50:30.252000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Cross-Site Scripting Vulnerability (CNVD-2022-36389)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332551" }, { "title": "Siemens SICAM Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194645" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "CNNVD", "id": "CNNVD-202205-3118" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29882" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29882/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "VULMON", "id": "CVE-2022-29882" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36389" }, { "db": "VULMON", "id": "CVE-2022-29882" }, { "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "db": "NVD", "id": "CVE-2022-29882" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36389" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "date": "2022-05-20T13:15:16.377000", "db": "NVD", "id": "CVE-2022-29882" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36389" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010133" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3118" }, { "date": "2024-11-21T06:59:53.823000", "db": "NVD", "id": "CVE-2022-29882" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3118" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010133" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3118" } ], "trust": 0.6 } }
var-202205-0928
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30.
A security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. arbitrary code. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0928", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "NVD", "id": "CVE-2022-29872" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3137" } ], "trust": 0.6 }, "cve": "CVE-2022-29872", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2022-29872", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-36398", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-29872", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29872", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-36398", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3137", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "db": "NVD", "id": "CVE-2022-29872" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. \n\r\n\r\nA security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. arbitrary code. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29872" }, { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "VULMON", "id": "CVE-2022-29872" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29872", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-36398", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3137", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29872", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "VULMON", "id": "CVE-2022-29872" }, { "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "db": "NVD", "id": "CVE-2022-29872" } ] }, "id": "VAR-202205-0928", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" } ] }, "last_update_date": "2024-11-23T21:50:29.951000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Unknown Vulnerability in Siemens SICAM P850 and SICAM P855 Devices", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332516" }, { "title": "Siemens SICAM Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194237" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "CNNVD", "id": "CNNVD-202205-3137" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-141", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29872" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29872/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "VULMON", "id": "CVE-2022-29872" }, { "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "db": "NVD", "id": "CVE-2022-29872" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36398" }, { "db": "VULMON", "id": "CVE-2022-29872" }, { "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "db": "NVD", "id": "CVE-2022-29872" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36398" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "date": "2022-05-20T13:15:15.927000", "db": "NVD", "id": "CVE-2022-29872" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36398" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3137" }, { "date": "2024-11-21T06:59:51.960000", "db": "NVD", "id": "CVE-2022-29872" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3137" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown Vulnerability in Siemens SICAM P850 and SICAM P855 Devices", "sources": [ { "db": "CNVD", "id": "CNVD-2022-36398" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3137" } ], "trust": 0.6 } }
var-202205-0925
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Several Siemens products, such as firmware, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3123" } ], "trust": 0.6 }, "cve": "CVE-2022-29878", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-29878", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2022-36393", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2022-29878", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29878", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29878", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-29878", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-36393", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3123", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Several Siemens products, such as firmware, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29878" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "VULMON", "id": "CVE-2022-29878" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29878", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010137", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36393", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3123", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29878", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "VULMON", "id": "CVE-2022-29878" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "id": "VAR-202205-0925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" } ] }, "last_update_date": "2024-11-23T21:50:29.775000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Authentication Bypass Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332546" }, { "title": "Siemens SICAM Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194648" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "CNNVD", "id": "CNNVD-202205-3123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-294", "trust": 1.0 }, { "problemtype": "Capture-replay authentication evasion by (CWE-294) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29878" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29878/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "VULMON", "id": "CVE-2022-29878" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36393" }, { "db": "VULMON", "id": "CVE-2022-29878" }, { "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "db": "NVD", "id": "CVE-2022-29878" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36393" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "date": "2022-05-20T13:15:16.177000", "db": "NVD", "id": "CVE-2022-29878" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36393" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010137" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3123" }, { "date": "2024-11-21T06:59:53.087000", "db": "NVD", "id": "CVE-2022-29878" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "in multiple Siemens products \u00a0Capture-replay\u00a0 Authentication Bypass Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010137" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3123" } ], "trust": 0.6 } }
var-202205-0921
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30.
A security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0921", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3122" } ], "trust": 0.6 }, "cve": "CVE-2022-29880", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2022-29880", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36391", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2022-29880", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-29880", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29880", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29880", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36391", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3122", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. \n\r\n\r\nA security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29880" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "VULMON", "id": "CVE-2022-29880" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29880", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010135", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36391", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3122", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29880", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "VULMON", "id": "CVE-2022-29880" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "id": "VAR-202205-0921", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" } ] }, "last_update_date": "2024-11-23T21:50:30.036000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Cross-Site Scripting Vulnerability (CNVD-2022-36391)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332566" }, { "title": "Siemens SICAM Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194647" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "CNNVD", "id": "CNNVD-202205-3122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29880" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29880/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "VULMON", "id": "CVE-2022-29880" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36391" }, { "db": "VULMON", "id": "CVE-2022-29880" }, { "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "db": "NVD", "id": "CVE-2022-29880" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36391" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "date": "2022-05-20T13:15:16.280000", "db": "NVD", "id": "CVE-2022-29880" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36391" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010135" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3122" }, { "date": "2024-11-21T06:59:53.470000", "db": "NVD", "id": "CVE-2022-29880" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010135" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3122" } ], "trust": 0.6 } }
var-202205-0923
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30.
A security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0923", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "NVD", "id": "CVE-2022-29873" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3130" } ], "trust": 0.6 }, "cve": "CVE-2022-29873", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-36397", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29873", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29873", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-36397", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3130", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "db": "NVD", "id": "CVE-2022-29873" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. \n\r\n\r\nA security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29873" }, { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "VULMON", "id": "CVE-2022-29873" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29873", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-36397", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3130", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29873", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "VULMON", "id": "CVE-2022-29873" }, { "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "db": "NVD", "id": "CVE-2022-29873" } ] }, "id": "VAR-202205-0923", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" } ] }, "last_update_date": "2024-11-23T21:50:30.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Unknown Vulnerability in Siemens SICAM P850 and SICAM P855 Devices (CNVD-2022-36397)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332521" }, { "title": "Siemens SICAM Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=192513" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "CNNVD", "id": "CNNVD-202205-3130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-141", "trust": 1.0 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29873" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29873/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "VULMON", "id": "CVE-2022-29873" }, { "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "db": "NVD", "id": "CVE-2022-29873" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36397" }, { "db": "VULMON", "id": "CVE-2022-29873" }, { "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "db": "NVD", "id": "CVE-2022-29873" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36397" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "date": "2022-05-20T13:15:15.977000", "db": "NVD", "id": "CVE-2022-29873" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36397" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3130" }, { "date": "2024-11-21T06:59:52.157000", "db": "NVD", "id": "CVE-2022-29873" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown Vulnerability in Siemens SICAM P850 and SICAM P855 Devices (CNVD-2022-36397)", "sources": [ { "db": "CNVD", "id": "CNVD-2022-36397" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3130" } ], "trust": 0.6 } }
var-202205-0922
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30.
A security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0922", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3125" } ], "trust": 0.6 }, "cve": "CVE-2022-29879", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2022-29879", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36392", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-29879", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29879", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29879", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29879", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36392", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-3125", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. \n\r\n\r\nA security vulnerability exists in Siemens SICAM P850 and SICAM P855 Devices. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29879" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "VULMON", "id": "CVE-2022-29879" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29879", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010136", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36392", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3125", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29879", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "VULMON", "id": "CVE-2022-29879" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "id": "VAR-202205-0922", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" } ] }, "last_update_date": "2024-11-23T21:50:30.068000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Authentication Vulnerability (CNVD-2022-36392)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332556" }, { "title": "Siemens SICAM Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194649" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "CNNVD", "id": "CNNVD-202205-3125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29879" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29879/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "VULMON", "id": "CVE-2022-29879" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36392" }, { "db": "VULMON", "id": "CVE-2022-29879" }, { "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "db": "NVD", "id": "CVE-2022-29879" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36392" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "date": "2022-05-20T13:15:16.227000", "db": "NVD", "id": "CVE-2022-29879" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36392" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010136" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3125" }, { "date": "2024-11-21T06:59:53.297000", "db": "NVD", "id": "CVE-2022-29879" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lack of authentication for critical functions in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010136" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3125" } ], "trust": 0.6 } }
var-202205-0919
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa02-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa32-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa10-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa12-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8550-0aa00-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa11-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa31-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-2aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8500-0aa30-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "7kg8501-0aa01-0aa0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3126" } ], "trust": 0.6 }, "cve": "CVE-2022-29877", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29877", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-36394", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2022-29877", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-29877", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29877", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-29877", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-36394", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-3126", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user. 7kg8500-0aa00-0aa0 firmware, 7kg8500-0aa00-2aa0 firmware, 7kg8500-0aa10-0aa0 Multiple Siemens products, such as firmware, are vulnerable to lack of authentication for critical functions.Information may be obtained and information may be tampered with. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29877" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "VULMON", "id": "CVE-2022-29877" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29877", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU92977068", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-010138", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-36394", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3126", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29877", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "VULMON", "id": "CVE-2022-29877" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "id": "VAR-202205-0919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" } ] }, "last_update_date": "2024-11-23T21:50:30.338000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Authentication Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332536" }, { "title": "Siemens SICAM Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194650" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "CNNVD", "id": "CNNVD-202205-3126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92977068/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29877" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29877/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "VULMON", "id": "CVE-2022-29877" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36394" }, { "db": "VULMON", "id": "CVE-2022-29877" }, { "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "db": "NVD", "id": "CVE-2022-29877" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36394" }, { "date": "2023-08-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "date": "2022-05-20T13:15:16.130000", "db": "NVD", "id": "CVE-2022-29877" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36394" }, { "date": "2023-08-10T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-010138" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3126" }, { "date": "2024-11-21T06:59:52.900000", "db": "NVD", "id": "CVE-2022-29877" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lack of authentication for critical functions in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-010138" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3126" } ], "trust": 0.6 } }
var-202205-0920
Vulnerability from variot
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sicam p850", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "sicam p855", "scope": "lt", "trust": 10.8, "vendor": "siemens", "version": "v3.00" }, { "model": "7kg8551-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa01-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa02-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa02-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa00-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa12-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa11-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8500-0aa10-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-2aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8551-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa32-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8501-0aa31-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" }, { "model": "7kg8550-0aa30-0aa0", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.00" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "NVD", "id": "CVE-2022-29874" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael Messner from Siemens Energy reported these vulnerabilities to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3129" } ], "trust": 0.6 }, "cve": "CVE-2022-29874", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-29874", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-36396", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29874", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-29874", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-36396", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3129", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "db": "NVD", "id": "CVE-2022-29874" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. The SICAM P850 multifunctional measuring device is used to acquire, visualize, evaluate and transmit electrical measurement variables such as alternating current, alternating voltage, frequency, power, harmonics, etc. The SICAM P855 multifunction device is used to collect, display and transmit measured electrical variables such as AC current, AC voltage, power type, harmonics, etc. Measured values and events are collected and processed according to the power quality standard IEC 61000-4-30. Siemens SICAM P850 and SICAM P855", "sources": [ { "db": "NVD", "id": "CVE-2022-29874" }, { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "VULMON", "id": "CVE-2022-29874" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29874", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-165073", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-22-132-07", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-36396", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2357", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051724", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3129", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29874", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "VULMON", "id": "CVE-2022-29874" }, { "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "db": "NVD", "id": "CVE-2022-29874" } ] }, "id": "VAR-202205-0920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" } ] }, "last_update_date": "2024-11-23T21:50:30.730000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SICAM P850 and SICAM P855 Devices Sensitive Information Cleartext Transmission Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/332526" }, { "title": "Siemens SICAM Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194234" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "CNNVD", "id": "CNNVD-202205-3129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29874" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051724" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-07" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29874/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2357" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "VULMON", "id": "CVE-2022-29874" }, { "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "db": "NVD", "id": "CVE-2022-29874" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-36396" }, { "db": "VULMON", "id": "CVE-2022-29874" }, { "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "db": "NVD", "id": "CVE-2022-29874" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36396" }, { "date": "2022-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "date": "2022-05-20T13:15:16.030000", "db": "NVD", "id": "CVE-2022-29874" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-11T00:00:00", "db": "CNVD", "id": "CNVD-2022-36396" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3129" }, { "date": "2024-11-21T06:59:52.343000", "db": "NVD", "id": "CVE-2022-29874" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SICAM P850 and SICAM P855 Devices Sensitive Information Cleartext Transmission Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2022-36396" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3129" } ], "trust": 0.6 } }