9.1
CVE-2022-24042
- EPSS 0.3%
- Published 10.05.2022 11:15:08
- Last modified 21.11.2024 06:49:43
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could be able to capture this token and re-use old session credentials or session IDs for authorization.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Desigo Pxc5 Firmware Version < 02.20.142.10-10884
Siemens ≫ Desigo Pxc4 Firmware Version < 02.20.142.10-10884
Siemens ≫ Desigo Pxc3 Firmware Version < 01.21.142.4-18
Siemens ≫ Desigo Dxr2 Firmware Version < 01.21.142.5-22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.527 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:P/I:P/A:N
|
CWE-613 Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."