8.8
CVE-2022-31619
- EPSS 1.39%
- Published 14.06.2022 10:15:20
- Last modified 21.11.2024 07:04:51
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions < V13.1.0.9), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). Java EE Server Manager HTML Adaptor in Teamcenter consists of default hardcoded credentials. Access to the application allows a user to perform a series of actions that could potentially lead to remote code execution with elevated permissions.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Teamcenter Version >= 12.4 < 12.4.0.13
Siemens ≫ Teamcenter Version >= 13.0 < 13.0.0.9
Siemens ≫ Teamcenter Version >= 13.1 < 13.1.0.9
Siemens ≫ Teamcenter Version >= 13.2 < 13.2.0.9
Siemens ≫ Teamcenter Version >= 13.3 < 13.3.0.3
Siemens ≫ Teamcenter Version >= 14.0 < 14.0.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.39% | 0.795 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.