6.1
CVE-2022-29876
- EPSS 0.91%
- Published 20.05.2022 13:15:16
- Last modified 21.11.2024 06:59:52
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.91% | 0.749 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.