Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-24040 (GCVE-0-2022-24040)
Vulnerability from cvelistv5
- CWE-400 - Uncontrolled Resource Consumption
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Siemens | Desigo DXR2 |
Version: All versions < V01.21.142.5-22 |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:59:23.638Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Desigo DXR2",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V01.21.142.5-22"
}
]
},
{
"product": "Desigo PXC3",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V01.21.142.4-18"
}
]
},
{
"product": "Desigo PXC4",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V02.20.142.10-10884"
}
]
},
{
"product": "Desigo PXC5",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V02.20.142.10-10884"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-06-14T09:21:30",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24040",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Desigo DXR2",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V01.21.142.5-22"
}
]
}
},
{
"product_name": "Desigo PXC3",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V01.21.142.4-18"
}
]
}
},
{
"product_name": "Desigo PXC4",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V02.20.142.10-10884"
}
]
}
},
{
"product_name": "Desigo PXC5",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V02.20.142.10-10884"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2022-24040",
"datePublished": "2022-05-10T09:46:48",
"dateReserved": "2022-01-27T00:00:00",
"dateUpdated": "2024-08-03T03:59:23.638Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-24040\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2022-05-10T11:15:08.287\",\"lastModified\":\"2024-11-21T06:49:42.783\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en Desigo DXR2 (Todas las versiones anteriores a V01.21.142.5-22), Desigo PXC3 (Todas las versiones anteriores a V01.21.142.4-18), Desigo PXC4 (Todas las versiones anteriores a V02.20.142.10-10884), Desigo PXC5 (Todas las versiones anteriores a V02.20.142.10-10884). La aplicaci\u00f3n web no aplica un l\u00edmite superior al factor de coste de la clave derivada PBKDF2 durante la creaci\u00f3n o actualizaci\u00f3n de una cuenta. Un atacante con el privilegio de acceso al perfil de usuario podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) a trav\u00e9s del consumo de la CPU mediante la configuraci\u00f3n de una clave derivada PBKDF2 con un esfuerzo de coste notablemente alto y luego intentar un inicio de sesi\u00f3n en la cuenta as\u00ed modificada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.20.142.10-10884\",\"matchCriteriaId\":\"7B710014-DE57-43C2-9BFE-A4F8AF6542D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4E2A7F6-B6E5-4230-8F13-64745C434A71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.20.142.10-10884\",\"matchCriteriaId\":\"84D6AF5F-AD6D-4A30-9D72-31A3BA2A5DC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0327220F-B5E6-4722-AEB2-BC4C21F1060D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.21.142.4-18\",\"matchCriteriaId\":\"D7ABEE98-3FF4-4E7C-B1CD-0E5E56E437FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"373009ED-3AE4-4F0B-940D-8E82668C3FF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.21.142.5-22\",\"matchCriteriaId\":\"5B50EDDC-4B68-416E-B8BE-58399A90FE44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EDDCD7-3B64-410E-A294-0F5F65849F4E\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
ICSA-22-132-10
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Andrea Palanca"
],
"organization": "Nozomi Networks",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to potentially intercept unencrypted transmission of sensitive information, cause a denial-of-service condition, perform remote code execution, or disable and reset a device to factory state.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Multiple Sectors",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/ics in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-22-132-10 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-132-10.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-132-10 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-10"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Desigo PXC and DXR Devices",
"tracking": {
"current_release_date": "2022-06-16T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-132-10",
"initial_release_date": "2022-05-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2022-05-12T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-22-132-10 Siemens Desigo PXC and DXR Devices"
},
{
"date": "2022-06-16T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-22-132-10 Siemens Desigo PXC and DXR Devices (Update A)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 01.21.142.5-22",
"product": {
"name": "Desigo DXR2: All versions prior to v01.21.142.5-22",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Desigo DXR2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 01.21.142.4-18",
"product": {
"name": "Desigo PXC3: All versions prior to v01.21.142.4-18",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Desigo PXC3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 02.20.142.10-10884",
"product": {
"name": "Desigo PXC4: All versions prior to v02.20.142.10-10884",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Desigo PXC4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 02.20.142.10-10884",
"product": {
"name": "Desigo PXC5: All versions prior to v02.20.142.10-10884",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Desigo PXC5"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24039",
"cwe": {
"id": "CWE-75",
"name": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)"
},
"notes": [
{
"category": "summary",
"text": "The addCell JavaScript function fails to properly sanitize user-controllable input before including it into the generated XML body of the XLS report document as it is possible to inject arbitrary content (e.g., XML tags) into the generated file. An attacker with restricted privileges could corrupt the content used to generate XLS reports to leverage the application to deliver malicious files against higher-privileged users and obtain remote code execution (RCE) against the administrator \u0027s workstation.CVE-2022-24039 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/75.html"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24040",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial-of-service condition through CPU consumption by setting a PBKDF2 derived key with a high-cost effort, followed by a login attempt to the modified account.CVE-2022-24040 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24040"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24041",
"cwe": {
"id": "CWE-916",
"name": "Use of Password Hash With Insufficient Computational Effort"
},
"notes": [
{
"category": "summary",
"text": "The web application stores the PBKDF2 derived key of user \u0027s passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users.CVE-2022-24041 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24041"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24042",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "summary",
"text": "The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could capture this token and re-use old session credentials or session IDs for authorization.CVE-2022-24042 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24042"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24043",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames.CVE-2022-24043 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24043"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24044",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "summary",
"text": "The login functionality of the application does not employ countermeasures against password spraying attacks or credential stuffing attacks. An attacker could obtain a list of valid usernames on the device and use that list to perform a precise password spraying or credential stuffing attack to obtain access to at least one account.CVE-2022-24044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24044"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24045",
"cwe": {
"id": "CWE-614",
"name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute"
},
"notes": [
{
"category": "summary",
"text": "Following a successful login, the application sets the session cookie on the browser via client-side JavaScript code without applying security attributes (such as Secure HttpOnly or SameSite). Any attempts to browse the application via unencrypted HTTP protocol would lead to the transmission of all session cookies in plaintext through the network. An attacker could then sniff the network and capture sensitive information.CVE-2022-24045 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24045"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2021-41545",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "summary",
"text": "When the controller receives a specific BACnet protocol packet, an exception causes the BACnet communication function to go into a out of work state and could result in the controller going into a factory reset state.CVE-2021-41545 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41545"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
icsa-22-132-10
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Andrea Palanca"
],
"organization": "Nozomi Networks",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to potentially intercept unencrypted transmission of sensitive information, cause a denial-of-service condition, perform remote code execution, or disable and reset a device to factory state.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Multiple Sectors",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/ics in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-22-132-10 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-132-10.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-132-10 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-10"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Desigo PXC and DXR Devices",
"tracking": {
"current_release_date": "2022-06-16T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-132-10",
"initial_release_date": "2022-05-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2022-05-12T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-22-132-10 Siemens Desigo PXC and DXR Devices"
},
{
"date": "2022-06-16T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-22-132-10 Siemens Desigo PXC and DXR Devices (Update A)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 01.21.142.5-22",
"product": {
"name": "Desigo DXR2: All versions prior to v01.21.142.5-22",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Desigo DXR2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 01.21.142.4-18",
"product": {
"name": "Desigo PXC3: All versions prior to v01.21.142.4-18",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Desigo PXC3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 02.20.142.10-10884",
"product": {
"name": "Desigo PXC4: All versions prior to v02.20.142.10-10884",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Desigo PXC4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 02.20.142.10-10884",
"product": {
"name": "Desigo PXC5: All versions prior to v02.20.142.10-10884",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Desigo PXC5"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-24039",
"cwe": {
"id": "CWE-75",
"name": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)"
},
"notes": [
{
"category": "summary",
"text": "The addCell JavaScript function fails to properly sanitize user-controllable input before including it into the generated XML body of the XLS report document as it is possible to inject arbitrary content (e.g., XML tags) into the generated file. An attacker with restricted privileges could corrupt the content used to generate XLS reports to leverage the application to deliver malicious files against higher-privileged users and obtain remote code execution (RCE) against the administrator \u0027s workstation.CVE-2022-24039 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/75.html"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24040",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial-of-service condition through CPU consumption by setting a PBKDF2 derived key with a high-cost effort, followed by a login attempt to the modified account.CVE-2022-24040 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24040"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24041",
"cwe": {
"id": "CWE-916",
"name": "Use of Password Hash With Insufficient Computational Effort"
},
"notes": [
{
"category": "summary",
"text": "The web application stores the PBKDF2 derived key of user \u0027s passwords with a low iteration count. An attacker with user profile access privilege can retrieve the stored password hashes of other accounts and then successfully perform an offline cracking attack and recover the plaintext passwords of other users.CVE-2022-24041 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24041"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24042",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "summary",
"text": "The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could capture this token and re-use old session credentials or session IDs for authorization.CVE-2022-24042 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24042"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24043",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames.CVE-2022-24043 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24043"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24044",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "summary",
"text": "The login functionality of the application does not employ countermeasures against password spraying attacks or credential stuffing attacks. An attacker could obtain a list of valid usernames on the device and use that list to perform a precise password spraying or credential stuffing attack to obtain access to at least one account.CVE-2022-24044 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24044"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-24045",
"cwe": {
"id": "CWE-614",
"name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute"
},
"notes": [
{
"category": "summary",
"text": "Following a successful login, the application sets the session cookie on the browser via client-side JavaScript code without applying security attributes (such as Secure HttpOnly or SameSite). Any attempts to browse the application via unencrypted HTTP protocol would lead to the transmission of all session cookies in plaintext through the network. An attacker could then sniff the network and capture sensitive information.CVE-2022-24045 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24045"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2021-41545",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "summary",
"text": "When the controller receives a specific BACnet protocol packet, an exception causes the BACnet communication function to go into a out of work state and could result in the controller going into a factory reset state.CVE-2021-41545 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41545"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo DXR2: Update to v01.21.142.5-22 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC3: Update to v01.21.142.4-18 or later",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC4: Update to v02.20.142.10-10884 or later ",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"details": "Siemens recommends updating to the latest software version: Desigo PXC5: Update to v02.20.142.10-10884 or later",
"product_ids": [
"CSAFPID-0004"
]
},
{
"category": "vendor_fix",
"details": "Contact Siemens for update information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.siemens.com/cert/advisories"
},
{
"category": "vendor_fix",
"details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens \u0027 operational guidelines for industrial security and following the recommendations in the product manuals.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-626968",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"category": "vendor_fix",
"details": "For additional information, please refer to Siemens Security Advisory SSA-662649",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-662649.pdf"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
cnvd-2022-36378
Vulnerability from cnvd
用户可参考如下供应商提供的安全公告获得补丁信息: https://cert-portal.siemens.com/productcert/html/ssa-626968.html
| Name | ['Siemens Desigo PXC5 < V02.20.142.10-10884', 'Siemens Desigo PXC4 < V02.20.142.10-10884', 'Siemens Desigo PXC3 < V01.21.142.4-18', 'Siemens Desigo DXR2 < V01.21.142.5-22'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-24040"
}
},
"description": "Desigo DXR2\u63a7\u5236\u5668\u662f\u53ef\u7f16\u7a0b\u7684\u81ea\u52a8\u5316\u7ad9\uff0c\u4ee5\u652f\u6301\u7ec8\u7aefHVAC\u8bbe\u5907\u548cTRA\uff08\u5168\u623f\u95f4\u81ea\u52a8\u5316\uff09\u5e94\u7528\u7684\u6807\u51c6\u63a7\u5236\u9700\u6c42\u3002Desigo PXC3\u7cfb\u5217\u81ea\u52a8\u5316\u7ad9\u53ef\u7528\u4e8e\u529f\u80fd\u6027\u548c\u7075\u6d3b\u6027\u8981\u6c42\u66f4\u9ad8\u7684\u5efa\u7b51\u3002\u5f53\u591a\u4e2a\u4e13\u4e1a\uff08\u6696\u901a\u7a7a\u8c03\u3001\u7167\u660e\u3001\u906e\u9633\uff09\u7ed3\u5408\u5728\u4e00\u8d77\u5f62\u6210\u4e00\u4e2a\u89e3\u51b3\u65b9\u6848\u65f6\uff0c\u4ee5\u53ca\u9700\u8981\u9ad8\u5ea6\u7075\u6d3b\u6027\u65f6\uff0c\u4f7f\u7528Desigo\u623f\u95f4\u81ea\u52a8\u5316\u3002Desigo PXC4\u697c\u5b87\u81ea\u52a8\u5316\u63a7\u5236\u5668\u662f\u4e3a\u6696\u901a\u7a7a\u8c03\u7cfb\u7edf\u63a7\u5236\u800c\u8bbe\u8ba1\u7684\u3002\u5b83\u662f\u4e00\u6b3e\u7d27\u51d1\u578b\u8bbe\u5907\uff0c\u5185\u7f6eIOs\uff0c\u80fd\u591f\u901a\u8fc7\u989d\u5916\u7684TX-IO\u6a21\u5757\u6269\u5c55\u5230\u60a8\u7684\u9700\u8981\u3002Desigo PXC5\u662f\u4e00\u6b3e\u53ef\u81ea\u7531\u7f16\u7a0b\u63a7\u5236\u5668\uff0c\u7528\u4e8eBACnet\u7cfb\u7edf\u7ea7\u529f\u80fd\uff0c\u5982\u62a5\u8b66\u8def\u7531\u3001\u7cfb\u7edf\u8303\u56f4\u7684\u8c03\u5ea6\u548c\u8d8b\u52bf\u5206\u6790\uff0c\u4ee5\u53ca\u8bbe\u5907\u76d1\u63a7\u3002\n\nSiemens Desigo PXC\u548cDXR Devices\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7CPU\u6d88\u8017\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08DoS\uff09\u60c5\u51b5\u3002",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://cert-portal.siemens.com/productcert/html/ssa-626968.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-36378",
"openTime": "2022-05-12",
"patchDescription": "Desigo DXR2\u63a7\u5236\u5668\u662f\u53ef\u7f16\u7a0b\u7684\u81ea\u52a8\u5316\u7ad9\uff0c\u4ee5\u652f\u6301\u7ec8\u7aefHVAC\u8bbe\u5907\u548cTRA\uff08\u5168\u623f\u95f4\u81ea\u52a8\u5316\uff09\u5e94\u7528\u7684\u6807\u51c6\u63a7\u5236\u9700\u6c42\u3002Desigo PXC3\u7cfb\u5217\u81ea\u52a8\u5316\u7ad9\u53ef\u7528\u4e8e\u529f\u80fd\u6027\u548c\u7075\u6d3b\u6027\u8981\u6c42\u66f4\u9ad8\u7684\u5efa\u7b51\u3002\u5f53\u591a\u4e2a\u4e13\u4e1a\uff08\u6696\u901a\u7a7a\u8c03\u3001\u7167\u660e\u3001\u906e\u9633\uff09\u7ed3\u5408\u5728\u4e00\u8d77\u5f62\u6210\u4e00\u4e2a\u89e3\u51b3\u65b9\u6848\u65f6\uff0c\u4ee5\u53ca\u9700\u8981\u9ad8\u5ea6\u7075\u6d3b\u6027\u65f6\uff0c\u4f7f\u7528Desigo\u623f\u95f4\u81ea\u52a8\u5316\u3002Desigo PXC4\u697c\u5b87\u81ea\u52a8\u5316\u63a7\u5236\u5668\u662f\u4e3a\u6696\u901a\u7a7a\u8c03\u7cfb\u7edf\u63a7\u5236\u800c\u8bbe\u8ba1\u7684\u3002\u5b83\u662f\u4e00\u6b3e\u7d27\u51d1\u578b\u8bbe\u5907\uff0c\u5185\u7f6eIOs\uff0c\u80fd\u591f\u901a\u8fc7\u989d\u5916\u7684TX-IO\u6a21\u5757\u6269\u5c55\u5230\u60a8\u7684\u9700\u8981\u3002Desigo PXC5\u662f\u4e00\u6b3e\u53ef\u81ea\u7531\u7f16\u7a0b\u63a7\u5236\u5668\uff0c\u7528\u4e8eBACnet\u7cfb\u7edf\u7ea7\u529f\u80fd\uff0c\u5982\u62a5\u8b66\u8def\u7531\u3001\u7cfb\u7edf\u8303\u56f4\u7684\u8c03\u5ea6\u548c\u8d8b\u52bf\u5206\u6790\uff0c\u4ee5\u53ca\u8bbe\u5907\u76d1\u63a7\u3002\r\n\r\nSiemens Desigo PXC\u548cDXR Devices\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7CPU\u6d88\u8017\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08DoS\uff09\u60c5\u51b5\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens Desigo PXC\u548cDXR Devices\u4e0d\u53d7\u63a7\u5236\u8d44\u6e90\u6d88\u8017\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Siemens Desigo PXC5 \u003c V02.20.142.10-10884",
"Siemens Desigo PXC4 \u003c V02.20.142.10-10884",
"Siemens Desigo PXC3 \u003c V01.21.142.4-18",
"Siemens Desigo DXR2 \u003c V01.21.142.5-22"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-626968.html",
"serverity": "\u9ad8",
"submitTime": "2022-05-11",
"title": "Siemens Desigo PXC\u548cDXR Devices\u4e0d\u53d7\u63a7\u5236\u8d44\u6e90\u6d88\u8017\u6f0f\u6d1e"
}
fkie_cve-2022-24040
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | desigo_pxc5_firmware | * | |
| siemens | desigo_pxc5 | - | |
| siemens | desigo_pxc4_firmware | * | |
| siemens | desigo_pxc4 | - | |
| siemens | desigo_pxc3_firmware | * | |
| siemens | desigo_pxc3 | - | |
| siemens | desigo_dxr2_firmware | * | |
| siemens | desigo_dxr2 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B710014-DE57-43C2-9BFE-A4F8AF6542D5",
"versionEndExcluding": "02.20.142.10-10884",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E2A7F6-B6E5-4230-8F13-64745C434A71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84D6AF5F-AD6D-4A30-9D72-31A3BA2A5DC3",
"versionEndExcluding": "02.20.142.10-10884",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0327220F-B5E6-4722-AEB2-BC4C21F1060D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D7ABEE98-3FF4-4E7C-B1CD-0E5E56E437FF",
"versionEndExcluding": "01.21.142.4-18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "373009ED-3AE4-4F0B-940D-8E82668C3FF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B50EDDC-4B68-416E-B8BE-58399A90FE44",
"versionEndExcluding": "01.21.142.5-22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EDDCD7-3B64-410E-A294-0F5F65849F4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Desigo DXR2 (Todas las versiones anteriores a V01.21.142.5-22), Desigo PXC3 (Todas las versiones anteriores a V01.21.142.4-18), Desigo PXC4 (Todas las versiones anteriores a V02.20.142.10-10884), Desigo PXC5 (Todas las versiones anteriores a V02.20.142.10-10884). La aplicaci\u00f3n web no aplica un l\u00edmite superior al factor de coste de la clave derivada PBKDF2 durante la creaci\u00f3n o actualizaci\u00f3n de una cuenta. Un atacante con el privilegio de acceso al perfil de usuario podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) a trav\u00e9s del consumo de la CPU mediante la configuraci\u00f3n de una clave derivada PBKDF2 con un esfuerzo de coste notablemente alto y luego intentar un inicio de sesi\u00f3n en la cuenta as\u00ed modificada"
}
],
"id": "CVE-2022-24040",
"lastModified": "2024-11-21T06:49:42.783",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-10T11:15:08.287",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "productcert@siemens.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
var-202205-0553
Vulnerability from variot
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account. desigo pxc5 firmware, desigo pxc4 firmware, desigo pxc3 Multiple Siemens products such as firmware contain a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Desigo DXR2 controllers are programmable automation stations to support the standard control needs of terminal HVAC equipment and TRA (Total Room Automation) applications. The Desigo PXC3 series of automation stations can be used in buildings with higher requirements for functionality and flexibility. Use Desigo room automation when multiple specialties (HVAC, lighting, shading) are combined into one solution and when a high degree of flexibility is required. The Desigo PXC4 building automation controller is designed for HVAC system control. It is a compact device with built-in IOs that can be expanded to your needs with additional TX-IO modules. The Desigo PXC5 is a freely programmable controller for BACnet system-level functions such as alarm routing, system-wide scheduling and trending, and device monitoring
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0553",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "desigo pxc4",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "02.20.142.10-10884"
},
{
"model": "desigo pxc3",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "01.21.142.4-18"
},
{
"model": "desigo pxc5",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "02.20.142.10-10884"
},
{
"model": "desigo dxr2",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "01.21.142.5-22"
},
{
"model": "desigo dxr2",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "desigo pxc3",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "desigo pxc5",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "desigo pxc4",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "desigo pxc5",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v02.20.142.10-10884"
},
{
"model": "desigo pxc4",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v02.20.142.10-10884"
},
{
"model": "desigo pxc3",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v01.21.142.4-18"
},
{
"model": "desigo dxr2",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v01.21.142.5-22"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "reported these vulnerabilities to CISA.,Andrea Palanca, of Nozomi Networks",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
}
],
"trust": 0.6
},
"cve": "CVE-2022-24040",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CVE-2022-24040",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-36378",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2022-24040",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2022-24040",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24040",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24040",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-36378",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-2787",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-24040",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account. desigo pxc5 firmware, desigo pxc4 firmware, desigo pxc3 Multiple Siemens products such as firmware contain a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Desigo DXR2 controllers are programmable automation stations to support the standard control needs of terminal HVAC equipment and TRA (Total Room Automation) applications. The Desigo PXC3 series of automation stations can be used in buildings with higher requirements for functionality and flexibility. Use Desigo room automation when multiple specialties (HVAC, lighting, shading) are combined into one solution and when a high degree of flexibility is required. The Desigo PXC4 building automation controller is designed for HVAC system control. It is a compact device with built-in IOs that can be expanded to your needs with additional TX-IO modules. The Desigo PXC5 is a freely programmable controller for BACnet system-level functions such as alarm routing, system-wide scheduling and trending, and device monitoring",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24040"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24040",
"trust": 3.9
},
{
"db": "SIEMENS",
"id": "SSA-626968",
"trust": 3.1
},
{
"db": "ICS CERT",
"id": "ICSA-22-132-10",
"trust": 1.5
},
{
"db": "JVN",
"id": "JVNVU92977068",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-36378",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022051124",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.2349",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24040",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"id": "VAR-202205-0553",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
}
],
"trust": 1.2666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
}
]
},
"last_update_date": "2024-11-23T21:50:30.662000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Siemens Desigo PXC and DXR Devices Uncontrolled Resource Consumption Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/332616"
},
{
"title": "Multiple Siemens Product resource management error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193545"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Live-Hack-CVE/CVE-2022-24040 "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-400",
"trust": 1.0
},
{
"problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92977068/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24040"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-10"
},
{
"trust": 0.6,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-626968.html"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24040/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2349"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-10"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022051124"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/400.html"
},
{
"trust": 0.1,
"url": "https://github.com/live-hack-cve/cve-2022-24040"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-10"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"date": "2022-05-10T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"date": "2023-08-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"date": "2022-05-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"date": "2022-05-10T11:15:08.287000",
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-36378"
},
{
"date": "2022-10-06T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24040"
},
{
"date": "2023-08-04T08:29:00",
"db": "JVNDB",
"id": "JVNDB-2022-009473"
},
{
"date": "2022-05-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-2787"
},
{
"date": "2024-11-21T06:49:42.783000",
"db": "NVD",
"id": "CVE-2022-24040"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource Exhaustion Vulnerability in Multiple Siemens Products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009473"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-2787"
}
],
"trust": 0.6
}
}
gsd-2022-24040
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-24040",
"description": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.",
"id": "GSD-2022-24040"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-24040"
],
"details": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.",
"id": "GSD-2022-24040",
"modified": "2023-12-13T01:19:43.586128Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24040",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Desigo DXR2",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V01.21.142.5-22"
}
]
}
},
{
"product_name": "Desigo PXC3",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V01.21.142.4-18"
}
]
}
},
{
"product_name": "Desigo PXC4",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V02.20.142.10-10884"
}
]
}
},
{
"product_name": "Desigo PXC5",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V02.20.142.10-10884"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "02.20.142.10-10884",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "02.20.142.10-10884",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "01.21.142.4-18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "01.21.142.5-22",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24040"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-06T02:50Z",
"publishedDate": "2022-05-10T11:15Z"
}
}
}
CERTFR-2022-AVI-435
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- SICAM P850 versions antérieures à 3.00
- Simcenter Femap versions antérieures à 2022.2
- SIMATIC NET PC Software versions 14.x antérieures à 14 SP1 Update 14
- SIMATIC NET PC Software versions 17.x antérieures à 17 SP1
- SIMATIC Process Historian OPC UA Server versions antérieures à 2020 SP1
- SIMATIC WinCC versions 7.5.x antérieures à V7.5 SP2 Update 8
- SIMATIC CP 442-1 RNA versions antérieures à 1.5.18
- SIMATIC CP 443-1 RNA versions antérieures à 1.5.18
- JT2Go versions antérieures à 13.3.0.3
- Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.3
- Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.1
- Desigo DXR2 versions antérieures à 01.21.142.5-22
- Desigo PXC3 versions antérieures à 01.21.142.4-18
- Desigo PXC4 versions antérieures à 02.20.142.10-10884
- Desigo PXC5 versions antérieures à 02.20.142.10-10884
- RUGGEDCOM RM1224 LTE(4G) EU et RM1224 LTE(4G) NAM versions antérieures à 7.1
- SCALANCE M804PB, M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2), M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2), M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2), M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2), M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), M874-2 (6GK5874-2AA00-2AA2), M874-3 (6GK5874-3AA00-2AA2), M876-3 (EVDO) (6GK5876-3AA02-2BA2), M876-3 (ROK) (6GK5876-3AA02-2EA2), M876-4 (EU) (6GK5876-4AA00-2BA2), M876-4 (NAM) (6GK5876-4AA00-2DA2), MUM856-1 (EU) (6GK5856-2EA00-3DA1), MUM856-1 (RoW) (6GK5856-2EA00-3AA1) et S615 (6GK5615-0AA00-2AA2) versions antérieures à 7.1
- SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) versions antérieures à 3.0.22
- SIMATIC RTU3010C (6NH3112-0BA00-0XX0), RTU3030C (6NH3112-3BA00-0XX0), RTU3031C (6NH3112-3BB00-0XX0) et RTU3041C (6NH3112-4BB00-0XX0) versions antérieures à 5.0.14
- SIPLUS NET CP 1543-1 versions antérieures à 3.0.22
- OpenV2G versions antérieures à 0.9.5
- Teamcenter versions 12.4.x antérieures à 12.4.0.13
- Teamcenter versions 13.0.x antérieures à 13.0.0.9
- Teamcenter versions 13.2.x antérieures à 13.2.0.8
- Teamcenter versions 13.3.x antérieures à 13.3.0.3
- SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0), RF610R ETSI (6GT2811-6BC10-0AA0), RF610R FCC (6GT2811-6BC10-1AA0), RF615R CMIIT (6GT2811-6CC10-2AA0), RF615R ETSI (6GT2811-6CC10-0AA0), RF615R FCC (6GT2811-6CC10-1AA0), RF650R ARIB (6GT2811-6AB20-4AA0), RF650R CMIIT (6GT2811-6AB20-2AA0), RF650R ETSI (6GT2811-6AB20-0AA0), RF650R FCC (6GT2811-6AB20-1AA0), RF680R ARIB (6GT2811-6AA10-4AA0), RF680R CMIIT (6GT2811-6AA10-2AA0), RF680R ETSI (6GT2811-6AA10-0AA0), RF680R FCC (6GT2811-6AA10-1AA0), RF685R ARIB (6GT2811-6CA10-4AA0), RF685R CMIIT (6GT2811-6CA10-2AA0), RF685R ETSI (6GT2811-6CA10-0AA0) et RF685R FCC (6GT2811-6CA10-1AA0) versions 3.0.x antérieures à 4.0
- SIMATIC RF166C (6GT2002-0EE20), RF185C (6GT2002-0JE10), RF186C (6GT2002-0JE20), RF186CI (6GT2002-0JE50), RF188C (6GT2002-0JE40) et RF188CI (6GT2002-0JE60) versions 1.1.x antérieures à 1.3.2
- SIMATIC RF360R (6GT2801-5BA30) versions antérieures à 2.0
En fonction de la vulnérabilité, l'éditeur ne prévoit pas de correctif de sécurité pour les produits suivants :
- SITOP Manager toutes versions
- TeleControl Server Basic versions 3.x
- SIMATIC NET PC Software versions 15.x
- SIMATIC NET PC Software versions 16.x
- SIMATIC WinCC versions 16.x
- SIMATIC WinCC versions 17.x
- SIMATIC WinCC Runtime Professional toutes versions
- SIMATIC WinCC Unified Scada Runtime toutes versions
- SIMATIC PCS 7 versions 9.0.x et antérieures
- SIMATIC PCS 7 versions 9.1.x
- LOGO! CMR family toutes versions
- SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions
- Teamcenter versions 13.1.x
- Teamcenter versions 14.0.x
Se référer aux mesures de contournement listées dans les avis de l'éditeur.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eSICAM P850 versions ant\u00e9rieures \u00e0 3.00\u003c/li\u003e \u003cli\u003eSimcenter Femap versions ant\u00e9rieures \u00e0 2022.2\u003c/li\u003e \u003cli\u003eSIMATIC NET PC Software versions 14.x ant\u00e9rieures \u00e0 14 SP1 Update 14\u003c/li\u003e \u003cli\u003eSIMATIC NET PC Software versions 17.x ant\u00e9rieures \u00e0 17 SP1\u003c/li\u003e \u003cli\u003eSIMATIC Process Historian OPC UA Server versions ant\u00e9rieures \u00e0 2020 SP1\u003c/li\u003e \u003cli\u003eSIMATIC WinCC versions 7.5.x ant\u00e9rieures \u00e0 V7.5 SP2 Update 8\u003c/li\u003e \u003cli\u003eSIMATIC CP 442-1 RNA versions ant\u00e9rieures \u00e0 1.5.18\u003c/li\u003e \u003cli\u003eSIMATIC CP 443-1 RNA versions ant\u00e9rieures \u00e0 1.5.18\u003c/li\u003e \u003cli\u003eJT2Go versions ant\u00e9rieures \u00e0 13.3.0.3\u003c/li\u003e \u003cli\u003eTeamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.3\u003c/li\u003e \u003cli\u003eTeamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.1\u003c/li\u003e \u003cli\u003eDesigo DXR2 versions ant\u00e9rieures \u00e0 01.21.142.5-22\u003c/li\u003e \u003cli\u003eDesigo PXC3 versions ant\u00e9rieures \u00e0 01.21.142.4-18\u003c/li\u003e \u003cli\u003eDesigo PXC4 versions ant\u00e9rieures \u00e0 02.20.142.10-10884\u003c/li\u003e \u003cli\u003eDesigo PXC5 versions ant\u00e9rieures \u00e0 02.20.142.10-10884\u003c/li\u003e \u003cli\u003eRUGGEDCOM RM1224 LTE(4G) EU et RM1224 LTE(4G) NAM versions ant\u00e9rieures \u00e0 7.1\u003c/li\u003e \u003cli\u003eSCALANCE M804PB, M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2), M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2), M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2), M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2), M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), M874-2 (6GK5874-2AA00-2AA2), M874-3 (6GK5874-3AA00-2AA2), M876-3 (EVDO) (6GK5876-3AA02-2BA2), M876-3 (ROK) (6GK5876-3AA02-2EA2), M876-4 (EU) (6GK5876-4AA00-2BA2), M876-4 (NAM) (6GK5876-4AA00-2DA2), MUM856-1 (EU) (6GK5856-2EA00-3DA1), MUM856-1 (RoW) (6GK5856-2EA00-3AA1) et S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 7.1\u003c/li\u003e \u003cli\u003eSIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) versions ant\u00e9rieures \u00e0 3.0.22\u003c/li\u003e \u003cli\u003eSIMATIC RTU3010C (6NH3112-0BA00-0XX0), RTU3030C (6NH3112-3BA00-0XX0), RTU3031C (6NH3112-3BB00-0XX0) et RTU3041C (6NH3112-4BB00-0XX0) versions ant\u00e9rieures \u00e0 5.0.14\u003c/li\u003e \u003cli\u003eSIPLUS NET CP 1543-1 versions ant\u00e9rieures \u00e0 3.0.22\u003c/li\u003e \u003cli\u003eOpenV2G versions ant\u00e9rieures \u00e0 0.9.5\u003c/li\u003e \u003cli\u003eTeamcenter versions 12.4.x ant\u00e9rieures \u00e0 12.4.0.13\u003c/li\u003e \u003cli\u003eTeamcenter versions 13.0.x ant\u00e9rieures \u00e0 13.0.0.9\u003c/li\u003e \u003cli\u003eTeamcenter versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.8\u003c/li\u003e \u003cli\u003eTeamcenter versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.3\u003c/li\u003e \u003cli\u003eSIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0), RF610R ETSI (6GT2811-6BC10-0AA0), RF610R FCC (6GT2811-6BC10-1AA0), RF615R CMIIT (6GT2811-6CC10-2AA0), RF615R ETSI (6GT2811-6CC10-0AA0), RF615R FCC (6GT2811-6CC10-1AA0), RF650R ARIB (6GT2811-6AB20-4AA0), RF650R CMIIT (6GT2811-6AB20-2AA0), RF650R ETSI (6GT2811-6AB20-0AA0), RF650R FCC (6GT2811-6AB20-1AA0), RF680R ARIB (6GT2811-6AA10-4AA0), RF680R CMIIT (6GT2811-6AA10-2AA0), RF680R ETSI (6GT2811-6AA10-0AA0), RF680R FCC (6GT2811-6AA10-1AA0), RF685R ARIB (6GT2811-6CA10-4AA0), RF685R CMIIT (6GT2811-6CA10-2AA0), RF685R ETSI (6GT2811-6CA10-0AA0) et RF685R FCC (6GT2811-6CA10-1AA0) versions 3.0.x ant\u00e9rieures \u00e0 4.0\u003c/li\u003e \u003cli\u003eSIMATIC RF166C (6GT2002-0EE20), RF185C (6GT2002-0JE10), RF186C (6GT2002-0JE20), RF186CI (6GT2002-0JE50), RF188C (6GT2002-0JE40) et RF188CI (6GT2002-0JE60) versions 1.1.x ant\u00e9rieures \u00e0 1.3.2\u003c/li\u003e \u003cli\u003eSIMATIC RF360R (6GT2801-5BA30) versions ant\u00e9rieures \u00e0 2.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eEn fonction de la vuln\u00e9rabilit\u00e9, l\u0027\u00e9diteur ne pr\u00e9voit pas de correctif de s\u00e9curit\u00e9 pour les produits suivants :\u003c/p\u003e \u003cul\u003e \u003cli\u003eSITOP Manager toutes versions\u003c/li\u003e \u003cli\u003eTeleControl Server Basic versions 3.x\u003c/li\u003e \u003cli\u003eSIMATIC NET PC Software versions 15.x\u003c/li\u003e \u003cli\u003eSIMATIC NET PC Software versions 16.x\u003c/li\u003e \u003cli\u003eSIMATIC WinCC versions 16.x\u003c/li\u003e \u003cli\u003eSIMATIC WinCC versions 17.x\u003c/li\u003e \u003cli\u003eSIMATIC WinCC Runtime Professional toutes versions\u003c/li\u003e \u003cli\u003eSIMATIC WinCC Unified Scada Runtime toutes versions\u003c/li\u003e \u003cli\u003eSIMATIC PCS 7 versions 9.0.x et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eSIMATIC PCS 7 versions 9.1.x\u003c/li\u003e \u003cli\u003eLOGO! CMR family toutes versions\u003c/li\u003e \u003cli\u003eSIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions\u003c/li\u003e \u003cli\u003eTeamcenter versions 13.1.x\u003c/li\u003e \u003cli\u003eTeamcenter versions 14.0.x\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux mesures de contournement list\u00e9es dans les avis de l\u0027\u00e9diteur.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27653"
},
{
"name": "CVE-2022-24043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24043"
},
{
"name": "CVE-2022-29879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29879"
},
{
"name": "CVE-2022-24044",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24044"
},
{
"name": "CVE-2022-24041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24041"
},
{
"name": "CVE-2022-27242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27242"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-24290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24290"
},
{
"name": "CVE-2022-29880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29880"
},
{
"name": "CVE-2022-24045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24045"
},
{
"name": "CVE-2022-29882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29882"
},
{
"name": "CVE-2022-24039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24039"
},
{
"name": "CVE-2022-24042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24042"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-29033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29033"
},
{
"name": "CVE-2022-24040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24040"
},
{
"name": "CVE-2022-24287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24287"
},
{
"name": "CVE-2021-41545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41545"
},
{
"name": "CVE-2022-29873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29873"
},
{
"name": "CVE-2022-29801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29801"
},
{
"name": "CVE-2021-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40142"
},
{
"name": "CVE-2022-29874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29874"
},
{
"name": "CVE-2022-27640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27640"
},
{
"name": "CVE-2022-29876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29876"
},
{
"name": "CVE-2022-29877",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29877"
},
{
"name": "CVE-2021-45117",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45117"
},
{
"name": "CVE-2022-29029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29029"
},
{
"name": "CVE-2022-29881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29881"
},
{
"name": "CVE-2022-29032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29032"
},
{
"name": "CVE-2022-29872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29872"
},
{
"name": "CVE-2022-29878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29878"
},
{
"name": "CVE-2021-31340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31340"
},
{
"name": "CVE-2022-29031",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29031"
},
{
"name": "CVE-2022-29030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29030"
},
{
"name": "CVE-2022-29028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29028"
},
{
"name": "CVE-2022-29883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29883"
}
],
"initial_release_date": "2022-05-10T00:00:00",
"last_revision_date": "2022-05-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-435",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-736385 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-736385.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-732250 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-732250.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-321292 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-321292.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-787292 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-787292.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-162616 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-162616.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-553086 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-553086.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480937 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480937.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-626968 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-626968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-363107 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-363107.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-789162 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-789162.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-165073 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-165073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-662649 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-662649.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-285795 du 10 mai 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-285795.html"
}
]
}
ghsa-gvmv-rhmr-mw99
Vulnerability from github
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.
{
"affected": [],
"aliases": [
"CVE-2022-24040"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-05-10T11:15:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability has been identified in Desigo DXR2 (All versions \u003c V01.21.142.5-22), Desigo PXC3 (All versions \u003c V01.21.142.4-18), Desigo PXC4 (All versions \u003c V02.20.142.10-10884), Desigo PXC5 (All versions \u003c V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.",
"id": "GHSA-gvmv-rhmr-mw99",
"modified": "2022-05-20T00:00:36Z",
"published": "2022-05-11T00:01:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24040"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.