8.8
CVE-2022-29872
- EPSS 1.29%
- Published 20.05.2022 13:15:15
- Last modified 21.11.2024 06:59:51
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.29% | 0.788 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-141 Improper Neutralization of Parameter/Argument Delimiters
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as parameter or argument delimiters when they are sent to a downstream component.
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.