Siemens

Scalance Sc622-2c Firmware

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 13.12.2022 16:15:25
  • Zuletzt bearbeitet 14.01.2025 11:15:10

Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.

  • EPSS 0.07%
  • Veröffentlicht 13.12.2022 16:15:25
  • Zuletzt bearbeitet 14.01.2025 11:15:11

Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.

  • EPSS 0.28%
  • Veröffentlicht 13.12.2022 16:15:25
  • Zuletzt bearbeitet 14.01.2025 11:15:11

Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.

  • EPSS 0.51%
  • Veröffentlicht 10.08.2022 12:15:12
  • Zuletzt bearbeitet 21.11.2024 07:12:47

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

  • EPSS 0.37%
  • Veröffentlicht 10.08.2022 12:15:12
  • Zuletzt bearbeitet 21.11.2024 07:12:47

Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.

Exploit
  • EPSS 1.4%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 2.57%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.6%
  • Veröffentlicht 18.05.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:02:09

A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 25.03.2022 09:15:08
  • Zuletzt bearbeitet 21.08.2025 20:37:11

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

  • EPSS 2.33%
  • Veröffentlicht 18.10.2021 14:15:10
  • Zuletzt bearbeitet 21.11.2024 06:27:02

The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less...