8.1
CVE-2022-29878
- EPSS 0.44%
- Published 20.05.2022 13:15:16
- Last modified 21.11.2024 06:59:53
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.622 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).