8.1
CVE-2022-29878
- EPSS 0.53%
- Veröffentlicht 20.05.2022 13:15:16
- Zuletzt bearbeitet 09.12.2025 16:17:13
- Quelle productcert@siemens.com
- CVE-Watchlists
- Unerledigt
A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.00
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.53% | 0.663 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| productcert@siemens.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
| nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).