8.1
CVE-2022-29878
- EPSS 0.44%
- Veröffentlicht 20.05.2022 13:15:16
- Zuletzt bearbeitet 21.11.2024 06:59:53
- Quelle productcert@siemens.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.00
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.622 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).