All the vulnerabilites related to Siemens - HiMed Cockpit 18 pro
cve-2023-52952
Vulnerability from cvelistv5
Published
2024-10-08 08:40
Modified
2024-10-08 14:07
Summary
A vulnerability has been identified in HiMed Cockpit 12 pro (J31032-K2017-H259) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 14 pro+ (J31032-K2017-H435) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro (J31032-K2017-H260) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro+ (J31032-K2017-H436) (All versions >= V11.5.1 < V11.6.2). The Kiosk Mode of the affected devices contains a restricted desktop environment escape vulnerability. This could allow an unauthenticated local attacker to escape the restricted environment and gain access to the underlying operating system.
Impacted products
Vendor Product Version
Siemens HiMed Cockpit 14 pro+ Version: V11.5.1   < V11.6.2
Siemens HiMed Cockpit 18 pro Version: V11.5.1   < V11.6.2
Siemens HiMed Cockpit 18 pro+ Version: V11.5.1   < V11.6.2
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52952",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-08T14:06:56.023306Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-08T14:07:06.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "HiMed Cockpit 12 pro",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V11.6.2",
              "status": "affected",
              "version": "V11.5.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "HiMed Cockpit 14 pro+",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V11.6.2",
              "status": "affected",
              "version": "V11.5.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "HiMed Cockpit 18 pro",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V11.6.2",
              "status": "affected",
              "version": "V11.5.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "HiMed Cockpit 18 pro+",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V11.6.2",
              "status": "affected",
              "version": "V11.5.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in HiMed Cockpit 12 pro (J31032-K2017-H259) (All versions \u003e= V11.5.1 \u003c V11.6.2), HiMed Cockpit 14 pro+ (J31032-K2017-H435) (All versions \u003e= V11.5.1 \u003c V11.6.2), HiMed Cockpit 18 pro (J31032-K2017-H260) (All versions \u003e= V11.5.1 \u003c V11.6.2), HiMed Cockpit 18 pro+ (J31032-K2017-H436) (All versions \u003e= V11.5.1 \u003c V11.6.2). The Kiosk Mode of the affected devices contains a restricted desktop environment escape vulnerability. This could allow an unauthenticated local attacker to escape the restricted environment and gain access to the underlying operating system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV4_0": {
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-424",
              "description": "CWE-424: Improper Protection of Alternate Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-08T08:40:09.943Z",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "url": "https://cert-portal.siemens.com/productcert/html/ssa-540493.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2023-52952",
    "datePublished": "2024-10-08T08:40:09.943Z",
    "dateReserved": "2024-10-02T11:30:53.068Z",
    "dateUpdated": "2024-10-08T14:07:06.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}