source-url
stringlengths
62
64
Prompt
stringlengths
762
25.3k
Correct Answer
stringlengths
74
7.83k
vulnerability-overview
stringlengths
186
24.7k
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 USE OF UNMAINTAINED THIRD-PARTY COMPONENTS CWE-1104 GNU/Linux vulnerabilities have been identified. For a full list of the identified vulnerabilities, please see Siemens SSB-439005
Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution.
4.2.1 USE OF UNMAINTAINED THIRD-PARTY COMPONENTS CWE-1104 GNU/Linux vulnerabilities have been identified. For a full list of the identified vulnerabilities, please see Siemens SSB-439005
https://www.cisa.gov/news-events/ics-advisories/icsa-20-161-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 --------- Begin Update K Part 2 of 2 --------- The affected product is vulnerable due to a common component of the affected applications that regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local unauthorized user to execute arbitrary code with SYSTEM privileges. CVE-2020-7580 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). --------- End Update K Part 2 of 2 ---------
Successful exploitation of this vulnerability could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges.
4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 --------- Begin Update K Part 2 of 2 --------- The affected product is vulnerable due to a common component of the affected applications that regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local unauthorized user to execute arbitrary code with SYSTEM privileges. CVE-2020-7580 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). --------- End Update K Part 2 of 2 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-20-105-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION (RESOURCE EXHAUSTION) CWE-400 The InterNiche-based TCP stack can be forced to make resource intense calls for every incoming packet, which can lead to a denial-of-service condition. CVE-2019-19300 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could create a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION (RESOURCE EXHAUSTION) CWE-400 The InterNiche-based TCP stack can be forced to make resource intense calls for every incoming packet, which can lead to a denial-of-service condition. CVE-2019-19300 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. CVE-2021-37209 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H).
Successful exploitation of this vulnerability could allow an authorized threat actor to obtain privileges to access passwords.
4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. CVE-2021-37209 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER INPUT VALIDATION CWE-20 Improper input validation in BIOS firmware for some Intel processors may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-0590 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.2 IMPROPER AUTHENTICATION CWE-287 Insufficient access control in the Linux kernel driver for some Intel processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-8694 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.3 IMPROPER ISOLATION OF SHARED RESOURCES ON SYSTEM-ON-A-CHIP CWE-1189 Improper isolation of shared resources in some Intel processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-8698 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.4 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2020-8745 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities may allow an authenticated user to enable escalation of privilege via local access.
4.2.1 IMPROPER INPUT VALIDATION CWE-20 Improper input validation in BIOS firmware for some Intel processors may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-0590 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.2 IMPROPER AUTHENTICATION CWE-287 Insufficient access control in the Linux kernel driver for some Intel processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-8694 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.3 IMPROPER ISOLATION OF SHARED RESOURCES ON SYSTEM-ON-A-CHIP CWE-1189 Improper isolation of shared resources in some Intel processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-8698 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 4.2.4 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. CVE-2020-8745 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-222-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A race condition in the firmware for some Intel processors may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 4.2.2 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper buffer restrictions in a subsystem in the Intel CSME versions prior to 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, and 15.0.22 may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8703 has been assigned to this vulnerability. A CVSS v3 base score of 5.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N). 4.2.3 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A race condition in a subsystem in the Intel LMS versions prior to 2039.1.0.0 may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8704 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.4 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper initialization in the firmware for some Intel processors may allow a privileged user to enable escalation of privilege via local access. CVE-2020-12357 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 4.2.5 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An out-of-bounds write in the firmware for some Intel processors may allow a privileged user to cause a denial-of-service condition via local access. CVE-2020-12358 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H). 4.2.6 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An out-of-bounds read in the firmware for some Intel processors may allow an authenticated user to enable an escalation of privilege via local access. CVE-2020-12360 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.7 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper input validation in the firmware for some Intel processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2020-24486 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 4.2.8 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Out-of-bounds read in a subsystem in the Intel CSME versions prior to 12.0.81, 13.0.47, 13.30.17, 14.1.53, and 14.5.32 may allow a privileged user to enable information disclosure via local access. CVE-2020-24506 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 4.2.9 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper initialization in a subsystem in the Intel CSME versions prior 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11, and 15.0.22 may allow a privileged user to enable information disclosure via local access. CVE-2020-24507 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 4.2.10 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper isolation of shared resources in some Intel processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24511 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.11 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An observable timing discrepancy in some Intel processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N). 4.2.12 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A domain-bypass transient execution vulnerability in some Intel Atom processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24513 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, privilege escalation, and configuration change.
4.2.1 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A race condition in the firmware for some Intel processors may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 4.2.2 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper buffer restrictions in a subsystem in the Intel CSME versions prior to 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, and 15.0.22 may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8703 has been assigned to this vulnerability. A CVSS v3 base score of 5.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N). 4.2.3 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A race condition in a subsystem in the Intel LMS versions prior to 2039.1.0.0 may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8704 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.4 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper initialization in the firmware for some Intel processors may allow a privileged user to enable escalation of privilege via local access. CVE-2020-12357 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 4.2.5 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An out-of-bounds write in the firmware for some Intel processors may allow a privileged user to cause a denial-of-service condition via local access. CVE-2020-12358 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H). 4.2.6 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An out-of-bounds read in the firmware for some Intel processors may allow an authenticated user to enable an escalation of privilege via local access. CVE-2020-12360 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.7 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper input validation in the firmware for some Intel processors may allow an authenticated user to potentially enable a denial of service via local access. CVE-2020-24486 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 4.2.8 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Out-of-bounds read in a subsystem in the Intel CSME versions prior to 12.0.81, 13.0.47, 13.30.17, 14.1.53, and 14.5.32 may allow a privileged user to enable information disclosure via local access. CVE-2020-24506 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 4.2.9 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper initialization in a subsystem in the Intel CSME versions prior 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11, and 15.0.22 may allow a privileged user to enable information disclosure via local access. CVE-2020-24507 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). 4.2.10 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 Improper isolation of shared resources in some Intel processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24511 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.11 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An observable timing discrepancy in some Intel processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24512 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N). 4.2.12 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A domain-bypass transient execution vulnerability in some Intel Atom processors may allow an authenticated user to enable information disclosure via local access. CVE-2020-24513 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial-of-service condition for TCP services on affected devices by sending specially crafted TCP segments. CVE-2022-25622 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of this vulnerability could allow a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial-of-service condition for TCP services on affected devices by sending specially crafted TCP segments. CVE-2022-25622 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In OPC Foundation Local Discovery Server versions before 1.04.402.463, remote attackers can cause a denial-of-service condition by sending targeted messages that lead to access of a memory location after the end of a buffer. CVE-2021-40142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could cause a denial-of-service condition on the service or the device.
4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In OPC Foundation Local Discovery Server versions before 1.04.402.463, remote attackers can cause a denial-of-service condition by sending targeted messages that lead to access of a memory location after the end of a buffer. CVE-2021-40142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 An attacker can trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters, which could result in a denial-of-service condition. Learn more about this vulnerability here. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.
4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 An attacker can trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters, which could result in a denial-of-service condition. Learn more about this vulnerability here. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SCRIPT-RELATED HTML TAGS IN A WEB PAGE (BASIC XSS) CWE-80 The integrated web server could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link, which an attacker could use to trigger a malicious request on the affected device. CVE-2022-46350 has been assigned to this vulnerability. A CVSS v3 base score of 7.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) 3.2.2 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Specially crafted PROFINET DCP packets could cause a denial-of-service condition of affected products on a local Ethernet segment (Layer 2). CVE-2022-46351 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.3 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Specially crafted PROFINET DCP packets could cause a denial-of-service condition of affected products. CVE-2022-46352 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.4 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The webserver of affected devices insecurely calculates session IDs and nonces. This could allow an unauthenticated remote attacker to brute-force session IDs and hijack existing sessions. CVE-2022-46353 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 3.2.5 IMPROPER ACCESS CONTROL CWE-284 The webservers of affected devices are missing specific security headers. This could allow a remote attacker to extract confidential session information under certain circumstances. CVE-2022-46354 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) 3.2.6 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The affected products are vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability by leaking sensitive data in the HTTP Referer. CVE-2022-46355 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
Successful exploitation of these vulnerabilities could result in a denial-of-service condition, hijacking of web sessions, and the loss of confidential or sensitive information.
3.2.1 IMPROPER NEUTRALIZATION OF SCRIPT-RELATED HTML TAGS IN A WEB PAGE (BASIC XSS) CWE-80 The integrated web server could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link, which an attacker could use to trigger a malicious request on the affected device. CVE-2022-46350 has been assigned to this vulnerability. A CVSS v3 base score of 7.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) 3.2.2 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Specially crafted PROFINET DCP packets could cause a denial-of-service condition of affected products on a local Ethernet segment (Layer 2). CVE-2022-46351 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.3 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Specially crafted PROFINET DCP packets could cause a denial-of-service condition of affected products. CVE-2022-46352 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.4 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The webserver of affected devices insecurely calculates session IDs and nonces. This could allow an unauthenticated remote attacker to brute-force session IDs and hijack existing sessions. CVE-2022-46353 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 3.2.5 IMPROPER ACCESS CONTROL CWE-284 The webservers of affected devices are missing specific security headers. This could allow a remote attacker to extract confidential session information under certain circumstances. CVE-2022-46354 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) 3.2.6 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The affected products are vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability by leaking sensitive data in the HTTP Referer. CVE-2022-46355 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 By injecting code into specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges on affected Siemens RUGGEDCOM and SCALANCE devices. CVE-2022-34821 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) 3.2.2 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Affected Siemens RUGGEDCOM and SCALANCE devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system. CVE-2022-46140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 3.2.3 STORING PASSWORDS IN A RECOVERABLE FORMAT CWE-257 Affected Siemens RUGGEDCOM and SCALANCE devices store command line interface (CLI) user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt CLI user passwords. CVE-2022-46142 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated. the CVSS vector string is (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) 3.2.4 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 Affected Siemens RUGGEDCOM and SCALANCE devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer potentially containing previously allocated data. CVE-2022-46143 has been assigned to this vulnerability. A CVSS v3 base score of 2.7 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) 3.2.5 IMPROPER CONTROL OF A RESOURCE THROUGH ITS LIFETIME CWE-664 Affected Siemens SCALANCE devices do not properly process CLI commands after a user forcefully quits the secure shell (SSH) connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. CVE-2022-46144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Successful exploitation of these vulnerabilities would allow an attacker to execute arbitrary code with elevated privileges or retrieve user credentials and other sensitive information.
3.2.1 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 By injecting code into specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges on affected Siemens RUGGEDCOM and SCALANCE devices. CVE-2022-34821 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated. the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) 3.2.2 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 Affected Siemens RUGGEDCOM and SCALANCE devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system. CVE-2022-46140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 3.2.3 STORING PASSWORDS IN A RECOVERABLE FORMAT CWE-257 Affected Siemens RUGGEDCOM and SCALANCE devices store command line interface (CLI) user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt CLI user passwords. CVE-2022-46142 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated. the CVSS vector string is (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) 3.2.4 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 Affected Siemens RUGGEDCOM and SCALANCE devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer potentially containing previously allocated data. CVE-2022-46143 has been assigned to this vulnerability. A CVSS v3 base score of 2.7 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) 3.2.5 IMPROPER CONTROL OF A RESOURCE THROUGH ITS LIFETIME CWE-664 Affected Siemens SCALANCE devices do not properly process CLI commands after a user forcefully quits the secure shell (SSH) connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. CVE-2022-46144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-346-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. CVE-2022-44575 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Successful exploitation of this vulnerability could allow an attacker to execute code after tricking users into accessing malicious links.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. CVE-2022-44575 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected application improperly assigns file permissions to installation folders. This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges. CVE-2022-43517 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges.
3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected application improperly assigns file permissions to installation folders. This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges. CVE-2022-43517 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74 The affected application contains a host header injection vulnerability that could allow an attacker to spoof host header information and redirect users to malicious websites. CVE-2022-46265 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
Successful exploitation of this vulnerability could allow an attacker to perform host header injection attacks.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74 The affected application contains a host header injection vulnerability that could allow an attacker to spoof host header information and redirect users to malicious websites. CVE-2022-46265 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker could craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial-of-service condition) or potential remote code execution. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication while a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected versions 3.0.0, 3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). CVE-2022-3602 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker could craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial-of-service) condition. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. This vulnerability is fixed in OpenSSL 3.0.7 (Affected versions 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6). CVE-2022-3786 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Successful exploitation of this vulnerability could allow for a denial of service or remote code execution.
3.2.1 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker could craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial-of-service condition) or potential remote code execution. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication while a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected versions 3.0.0, 3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). CVE-2022-3602 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.2 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker could craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial-of-service) condition. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. This vulnerability is fixed in OpenSSL 3.0.7 (Affected versions 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6). CVE-2022-3786 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342 Initial sequence numbers (ISNs) for TCP connections are derived from an insufficiently random source; the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future sessions. CVE-2020-28388 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
Successful exploitation of this vulnerability could allow an attacker to hijack existing sessions or spoof future sessions.
3.2.1 PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342 Initial sequence numbers (ISNs) for TCP connections are derived from an insufficiently random source; the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future sessions. CVE-2020-28388 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration. CVE-2022-45044 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Successful exploitation of this vulnerability could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration. CVE-2022-45044 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 RESOURCE MANAGEMENT ERRORS CWE-399 The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products could allow remote attackers to cause a denial-of-service condition (CPU consumption) via a specially crafted packet. CVE-2015-6574 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow attackers to cause a denial-of-service condition on affected SIPROTEC 5 devices.
3.2.1 RESOURCE MANAGEMENT ERRORS CWE-399 The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products could allow remote attackers to cause a denial-of-service condition (CPU consumption) via a specially crafted packet. CVE-2015-6574 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3159 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 HEAP-BASED BUFFER OVERFLOW CWE-122 The APDFL.dll contains an out-of-bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3160 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The APDFL.dll contains a memory corruption vulnerability while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3161 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could lead the application to crash or lead to arbitrary code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3159 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 HEAP-BASED BUFFER OVERFLOW CWE-122 The APDFL.dll contains an out-of-bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3160 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The APDFL.dll contains a memory corruption vulnerability while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3161 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens APOGGEE PXC Series versions prior to 3.5.5, APOGEE PXC Series versions prior to 2.8.20, and TALON TC Series versions prior to 3.5.5 are vulnerable to an Improper Access Control vulnerability, which could allow a low privilege authenticated attacker with network access to the integrated web server to download sensitive information from the device containing user account credentials. CVE-2022-45937 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow a low privilege authenticated attacker to gain high privilege access.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens APOGGEE PXC Series versions prior to 3.5.5, APOGEE PXC Series versions prior to 2.8.20, and TALON TC Series versions prior to 3.5.5 are vulnerable to an Improper Access Control vulnerability, which could allow a low privilege authenticated attacker with network access to the integrated web server to download sensitive information from the device containing user account credentials. CVE-2022-45937 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-17
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Email Connector versions prior to 2.0.0 improperly handle access control for some module entities, which could allow an authenticated remote attacker to read and manipulate sensitive information. CVE-2022-45936 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow an authenticated remote attacker to read and manipulate sensitive information.
3.2.1IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Email Connector versions prior to 2.0.0 improperly handle access control for some module entities, which could allow an authenticated remote attacker to read and manipulate sensitive information. CVE-2022-45936 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-18
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 Siemens SCALANCE SC-600 Family versions prior to 3.0; the zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has a plethora of distant matches. CVE-2022-25032 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2 USE AFTER FREE CWE-416 Siemens SCALANCE SC-600 Family versions prior to 3.0 is vulnerable to a use-after-free in Busybox 1.35-x's awk applet. The vulnerability could cause a denial of service and possible code execution when processing a crafted awk pattern in the copyvar function. CVE-2022-30065 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 Siemens SCALANCE SC-600 Family versions prior to 3.0: A malicious server can serve excessive amounts of "Set-Cookie:" headers in an HTTP response to curl and curl stores all of them. A sufficiently large amount of (big) cookies submit subsequent HTTP requests to this or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending large requests and instead returns an error. This may cause a denial-of-service state and might remain for as long as the same cookies are kept, match and haven't expired. CVE-2022-32205 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 Siemens SCALANCE SC-600 Family versions prior to 3.0 supports "chained" HTTP compression algorithmsmeaning that a server response can be compressed multiple times and potentially with different algorithms, allowing a malicious server to insert a virtually unlimited number of compression steps and spending enormous amounts of allocated heap memory that cause out of memory errors. CVE-2022-32206 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Successful exploitation of this vulnerability could allow a denial-of-service condition, corrupt memory, or potentially execute custom code.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 Siemens SCALANCE SC-600 Family versions prior to 3.0; the zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has a plethora of distant matches. CVE-2022-25032 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2 USE AFTER FREE CWE-416 Siemens SCALANCE SC-600 Family versions prior to 3.0 is vulnerable to a use-after-free in Busybox 1.35-x's awk applet. The vulnerability could cause a denial of service and possible code execution when processing a crafted awk pattern in the copyvar function. CVE-2022-30065 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 Siemens SCALANCE SC-600 Family versions prior to 3.0: A malicious server can serve excessive amounts of "Set-Cookie:" headers in an HTTP response to curl and curl stores all of them. A sufficiently large amount of (big) cookies submit subsequent HTTP requests to this or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending large requests and instead returns an error. This may cause a denial-of-service state and might remain for as long as the same cookies are kept, match and haven't expired. CVE-2022-32205 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 Siemens SCALANCE SC-600 Family versions prior to 3.0 supports "chained" HTTP compression algorithmsmeaning that a server response can be compressed multiple times and potentially with different algorithms, allowing a malicious server to insert a virtually unlimited number of compression steps and spending enormous amounts of allocated heap memory that cause out of memory errors. CVE-2022-32206 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-19
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious .dll in this folder, which is then run with SYSTEM rights when users start a service that requires this .dll. At the time of assigning the CVE number, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43722 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 3.2.2 IMPROPER VALIDATION OF SPECIFIED TYPE OF INPUT CWE-1287 Affected software does not properly validate the input for a certain parameter in the s7ontcp.dll. This could allow an unauthenticated remote attacker to send messages and create a denial of service condition as the application crashes. At the time of assigning the CVE, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43723 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature, unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43724 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
Successful exploitation of these vulnerabilities could lead to remote code execution, privilege escalation, or the creation of a denial-of-service condition.
3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious .dll in this folder, which is then run with SYSTEM rights when users start a service that requires this .dll. At the time of assigning the CVE number, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43722 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 3.2.2 IMPROPER VALIDATION OF SPECIFIED TYPE OF INPUT CWE-1287 Affected software does not properly validate the input for a certain parameter in the s7ontcp.dll. This could allow an unauthenticated remote attacker to send messages and create a denial of service condition as the application crashes. At the time of assigning the CVE, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43723 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature, unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, succeeding mainline versions have already superseded the affected firmware version of the component. CVE-2022-43724 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-20
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41278 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.2 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41279 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.3 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41280 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.4 OUT-OF-BOUNDS WRITE CWE-787 The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41283 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process. CVE-2022-41281 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.6 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41282 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.7 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41284 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.8 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41286 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.9 OUT-OF-BOUNDS READ CWE-125 The CCITT_G4Decode.dll contains an out of bounds read vulnerability when parsing a RAS file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-45484 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.10 USE AFTER FREE CWE-416 The CGM_NIST_Loader.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41285 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.11 DIVIDE BY ZERO CWE-369 The CGM_NIST_Loader.dll contains a divide by zero vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41287 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.12 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The CGM_NIST_Loader.dll contains stack exhaustion vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41288 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Successful exploitation of these vulnerabilities by tricking a user into opening a malicious file with the affected products could lead the application to crash or lead to arbitrary code execution.
3.2.1 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41278 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.2 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41279 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.3 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41280 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.4 OUT-OF-BOUNDS WRITE CWE-787 The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41283 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process. CVE-2022-41281 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.6 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41282 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.7 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41284 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.8 OUT-OF-BOUNDS READ CWE-125 The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41286 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.9 OUT-OF-BOUNDS READ CWE-125 The CCITT_G4Decode.dll contains an out of bounds read vulnerability when parsing a RAS file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-45484 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.10 USE AFTER FREE CWE-416 The CGM_NIST_Loader.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41285 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.11 DIVIDE BY ZERO CWE-369 The CGM_NIST_Loader.dll contains a divide by zero vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41287 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). 3.2.12 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 The CGM_NIST_Loader.dll contains stack exhaustion vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41288 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 SESSION FIXATION CWE-384 Affected SICAM P850 and P855 devices versions prior to 3.10 accept user defined session cookies and do not renew the session cookie after login or logout. This could allow an attacker to take over another users session after login. --------- Begin Update A part 1 of 2 --------- CVE-2022-40226 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). --------- End Update A part 1 of 2 --------- 4.2.2 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 --------- Begin Update A part 2 of 2 --------- Affected SICAM P850 and P855 devices versions prior to 3.10 do not properly validate the parameter of a specific GET request. This could allow an unauthenticated user to set the device to a denial-of-service state or to control the program counter and execute arbitrary code on the device. --------- End Update A part 2 of 2 --------- CVE-2022-41665 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attack to take over another users session after login, cause a denial-of-service condition, or control the program counter which could result in arbitrary code execution.
4.2.1 SESSION FIXATION CWE-384 Affected SICAM P850 and P855 devices versions prior to 3.10 accept user defined session cookies and do not renew the session cookie after login or logout. This could allow an attacker to take over another users session after login. --------- Begin Update A part 1 of 2 --------- CVE-2022-40226 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). --------- End Update A part 1 of 2 --------- 4.2.2 IMPROPER NEUTRALIZATION OF PARAMETER/ARGUMENT DELIMITERS CWE-141 --------- Begin Update A part 2 of 2 --------- Affected SICAM P850 and P855 devices versions prior to 3.10 do not properly validate the parameter of a specific GET request. This could allow an unauthenticated user to set the device to a denial-of-service state or to control the program counter and execute arbitrary code on the device. --------- End Update A part 2 of 2 --------- CVE-2022-41665 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-258-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 Affected versions of the module provide insufficient protection from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and access the application. CVE-2022-37011 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.2 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 When the non-recommended and non-default option Allow Idp initiated authentication is enabled, the affected versions insufficiently protect from packet capture replay. CVE-2022-44457 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow remote attackers to gain unauthenticated access to the application.
4.2.1 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 Affected versions of the module provide insufficient protection from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and access the application. CVE-2022-37011 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.2 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 When the non-recommended and non-default option Allow Idp initiated authentication is enabled, the affected versions insufficiently protect from packet capture replay. CVE-2022-44457 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 --------- Begin Update A Part 2 of 4 --------- The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the FTP server. --------- End Update A Part 2 of 4 --------- CVE-2022-38371 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow a remote attacker to generate a denial-of-service condition on devices running the affected software.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 --------- Begin Update A Part 2 of 4 --------- The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the FTP server. --------- End Update A Part 2 of 4 --------- CVE-2022-38371 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected application is vulnerable to fixed-length heap-based buffer while parsing specially crafted TIF files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-39136 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.2OUT-OF-BOUNDS WRITE CWE-787 The affected products contain an out-of-bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41660 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.3OUT-OF-BOUNDS READ CWE-125 The affected products contain an out-of-bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41661 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.4OUT-OF-BOUNDS READ CWE-125 The affected products contain an out-of-bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41662 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.5USE AFTER FREE CWE-416 The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41663 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.6STACK-BASED BUFFER OVERFLOW CWE-121 The affected application contains a stack-based buffer overflow vulnerability potentially triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-41664 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the current process.
4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected application is vulnerable to fixed-length heap-based buffer while parsing specially crafted TIF files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-39136 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.2OUT-OF-BOUNDS WRITE CWE-787 The affected products contain an out-of-bounds write vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41660 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.3OUT-OF-BOUNDS READ CWE-125 The affected products contain an out-of-bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41661 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.4OUT-OF-BOUNDS READ CWE-125 The affected products contain an out-of-bounds read vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41662 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 4.2.5USE AFTER FREE CWE-416 The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-41663 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 4.2.6STACK-BASED BUFFER OVERFLOW CWE-121 The affected application contains a stack-based buffer overflow vulnerability potentially triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-41664 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46345 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46346 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46347 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46348 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS READ CWE-125 The affected applications contain an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46349 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46345 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46346 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46347 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46348 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS READ CWE-125 The affected applications contain an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46349 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Workflow Commons versions prior to v2.4.0 of the module improperly handle access control for some module entities, which could allow authenticated remote attackers to read or delete sensitive information. CVE-2022-46664 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow authenticated remote attackers to read or delete sensitive information.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Workflow Commons versions prior to v2.4.0 of the module improperly handle access control for some module entities, which could allow authenticated remote attackers to read or delete sensitive information. CVE-2022-46664 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-40365 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44693 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) 3.2.3 IMPROPER VALIDATION OF SPECIFIED TYPE OF INPUT CWE-1287 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44694 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H) 3.2.4 IMPROPER VALIDATION OF SYNTACTIC CORRECTNESS OF INPUT CWE-1286 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44695 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)
Successful exploitation of these vulnerabilities could result in a remote attacker causing a denial-of-service condition on the affected devices.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-40365 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 3.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1284 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44693 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) 3.2.3 IMPROPER VALIDATION OF SPECIFIED TYPE OF INPUT CWE-1287 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44694 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H) 3.2.4 IMPROPER VALIDATION OF SYNTACTIC CORRECTNESS OF INPUT CWE-1286 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-44695 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack. CVE-2022-30694 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
Successful exploitation of this vulnerability could allow an attacker to track the activity of other users.
4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack. CVE-2022-30694 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') CWE-88 The affected component allows injection of custom arguments into the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attackers credentials or start a Ctrl script). CVE-2022-44731 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
Successful exploitation of this vulnerability could allow an authenticated remote attacker to inject arbitrary parameters when starting the Ultralight Client via the web interface.
3.2.1 IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') CWE-88 The affected component allows injection of custom arguments into the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attackers credentials or start a Ctrl script). CVE-2022-44731 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 MISSING AUTHORIZATION CWE-862 Affected Siemens SCALANCE and RUGGEDCOM devices of versions prior to V7.1.2 do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. CVE-2022-31765 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow low privileged attackers to escalate privileges.
4.2.1 MISSING AUTHORIZATION CWE-862 Affected Siemens SCALANCE and RUGGEDCOM devices of versions prior to V7.1.2 do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. CVE-2022-31765 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A crafted PKGX file could force ICONICS Workbench to write an arbitrary file through path traversal. CVE-2022-40264 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
Successful exploitation of this vulnerability could allow an attacker to write arbitrary files.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A crafted PKGX file could force ICONICS Workbench to write an arbitrary file through path traversal. CVE-2022-40264 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior are missing authentication for the updatePassword endpoint implemented in the LoginAction.updatePassword method. An unauthenticated user could exploit this vulnerability to modify administrator passwords. CVE-2022-42970 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior deploy the improperly secured UpLoadAction.execute method. An unauthenticated user could use this method to upload a maliciously crafted JSF file to the images directory, which is located in the application web root directory, to enable unauthenticated remote code execution. CVE-2022-42971 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior run the Tomcat instance with SYSTEM privileges. NT AUTHORITY\Authenticated Users could create new files in the Tomcat web root directory and could create and execute a maliciously crafted JSP file to escalate privileges and execute commands with system privileges. CVE-2022-42972 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.4 USE OF HARD-CODED CREDENTIALS CWE-798 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior use hard-coded MySQL database credentials. A local unauthorized user with access to the database could use the select into dumpfile operation to create arbitrary files, which could be used to execute commands with system privileges. CVE-2022-42973 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could result in unauthenticated remote code execution, unauthenticated password changes, and escalation of privileges.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior are missing authentication for the updatePassword endpoint implemented in the LoginAction.updatePassword method. An unauthenticated user could exploit this vulnerability to modify administrator passwords. CVE-2022-42970 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior deploy the improperly secured UpLoadAction.execute method. An unauthenticated user could use this method to upload a maliciously crafted JSF file to the images directory, which is located in the application web root directory, to enable unauthenticated remote code execution. CVE-2022-42971 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior run the Tomcat instance with SYSTEM privileges. NT AUTHORITY\Authenticated Users could create new files in the Tomcat web root directory and could create and execute a maliciously crafted JSP file to escalate privileges and execute commands with system privileges. CVE-2022-42972 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.4 USE OF HARD-CODED CREDENTIALS CWE-798 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior use hard-coded MySQL database credentials. A local unauthorized user with access to the database could use the select into dumpfile operation to create arbitrary files, which could be used to execute commands with system privileges. CVE-2022-42973 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-342-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 Advantech iView versions 5.7.04.6469 and prior are vulnerable to a SQL injection that could disclose sensitive product information to an unauthorized user. CVE-2022-3323 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow an attacker to acquire credentials.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 Advantech iView versions 5.7.04.6469 and prior are vulnerable to a SQL injection that could disclose sensitive product information to an unauthorized user. CVE-2022-3323 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-342-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device becomes unavailable in this condition, a user would have to clear and redownload the user project file to bring the device back online. CVE-2022-3752 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an unauthorized user to cause denial-of-service condition on a targeted device.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device becomes unavailable in this condition, a user would have to clear and redownload the user project file to bring the device back online. CVE-2022-3752 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-335-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The Config-files of Horner Automations RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). CVE-2022-2640 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 Horner Automations RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition. CVE-2022-2641 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 EXCESSIVE RELIANCE ON GLOBAL VARIABLES CWE-1108 Horner Automations RCC 972 firmware version 15.40 contains global variables. This could allow an attacker to read out sensitive values and variable keys from the device. CVE-2022-2642 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to obtain credentials to the affected device and obtain complete control.
3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The Config-files of Horner Automations RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). CVE-2022-2640 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 3.2.2 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 Horner Automations RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition. CVE-2022-2641 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 EXCESSIVE RELIANCE ON GLOBAL VARIABLES CWE-1108 Horner Automations RCC 972 firmware version 15.40 contains global variables. This could allow an attacker to read out sensitive values and variable keys from the device. CVE-2022-2642 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-335-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 MELSEC iQ-R Series RJ71EN71 products with firmware versions prior to 65 and R04/08/16/32/120ENCPU products with Network firmware versions prior to 65 are vulnerable to improper input validation. A remote unauthenticated user could cause a denial-of-service condition on a target product by sending specially crafted packets. A system reset is required to recover from a denial-of-service condition. CVE-2022-40265 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to cause a denial-of-service condition on a target product by sending specially crafted packets.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 MELSEC iQ-R Series RJ71EN71 products with firmware versions prior to 65 and R04/08/16/32/120ENCPU products with Network firmware versions prior to 65 are vulnerable to improper input validation. A remote unauthenticated user could cause a denial-of-service condition on a target product by sending specially crafted packets. A system reset is required to recover from a denial-of-service condition. CVE-2022-40265 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-19-346-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 AUTHENTICATION BYPASS BY SPOOFING CWE-290 An attacker could spoof arbitrary messages or execute commands. CVE-2019-18259 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.2 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 An attacker could monitor traffic between the PLC and the controller, and replay requests that could result in the opening and closing of industrial valves. CVE-2019-13533 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H). --------- Begin Update B Part 1 of 1 --------- 4.2.3 UNRESTRICTED EXTERNALLY ACCESSIBLE LOCK CWE-412 Omrons CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. CVE-2019-18269 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H). --------- End Update B Part 1 of 1 ---------
Successful exploitation of these vulnerabilities could allow an attacker to pose as an authorized user to obtain the status information of the PLC.
4.2.1 AUTHENTICATION BYPASS BY SPOOFING CWE-290 An attacker could spoof arbitrary messages or execute commands. CVE-2019-18259 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.2 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 An attacker could monitor traffic between the PLC and the controller, and replay requests that could result in the opening and closing of industrial valves. CVE-2019-13533 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H). --------- Begin Update B Part 1 of 1 --------- 4.2.3 UNRESTRICTED EXTERNALLY ACCESSIBLE LOCK CWE-412 Omrons CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. CVE-2019-18269 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H). --------- End Update B Part 1 of 1 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-21-334-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The product does not properly control the allocation and maintenance of a limited resource, and could thereby enable an actor to influence resource consumption, eventually leading to the exhaustion of available resources. CVE-2021-20609has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130 The product parses a formatted message or structure, but does not handle or incorrectly handles a length field inconsistent with the actual length of the associated data. CVE-2021-20610has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3IMPROPER INPUT VALIDATION CWE-20 The product receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. CVE-2021-20611has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow a remote attacker to cause a denial-of-service condition. Recovery requires a system reset.
3.2.1UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The product does not properly control the allocation and maintenance of a limited resource, and could thereby enable an actor to influence resource consumption, eventually leading to the exhaustion of available resources. CVE-2021-20609has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130 The product parses a formatted message or structure, but does not handle or incorrectly handles a length field inconsistent with the actual length of the associated data. CVE-2021-20610has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3IMPROPER INPUT VALIDATION CWE-20 The product receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. CVE-2021-20611has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected GOT2000 Series devices with FTP server versions 01.39.000 and prior are vulnerable to improper input validation, which could allow an attacker to cause a denial-of-service condition by sending a specially crafted command. CVE-2022-40266 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition by sending a specially crafted command.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected GOT2000 Series devices with FTP server versions 01.39.000 and prior are vulnerable to improper input validation, which could allow an attacker to cause a denial-of-service condition by sending a specially crafted command. CVE-2022-40266 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energys PCM600 products in which IED credentials are stored in cleartext inside the PCM600 database. An unauthorized user who gains access to the exported backup file could exploit this vulnerability and obtain IED credentials, which could be used to perform unauthorized modifications, such as loading incorrect configurations, rebooting the IEDs, or causing a denial-of-service condition. CVE-2022-2513 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow an attacker to obtain sensitive credentials and gain access to the affected products, perform unauthorized modifications, or provoke a denial-of-service condition.
3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energys PCM600 products in which IED credentials are stored in cleartext inside the PCM600 database. An unauthorized user who gains access to the exported backup file could exploit this vulnerability and obtain IED credentials, which could be used to perform unauthorized modifications, such as loading incorrect configurations, rebooting the IEDs, or causing a denial-of-service condition. CVE-2022-2513 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1IMPROPER USE OF VALIDATION FRAMEWORK CWE-1173 An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user could launch an administrator level remote code execution regardless of the authenticated user's role. CVE-2022-3388has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an unauthorized user to execute administrator level scripts.
3.2.1IMPROPER USE OF VALIDATION FRAMEWORK CWE-1173 An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user could launch an administrator level remote code execution regardless of the authenticated user's role. CVE-2022-3388has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER PHYSICAL ACCESS CONTROL CWE-1263 An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the devices authentication files to create a new user and gain full access to the system. CVE-2023-1257has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker with physical access to take full control of the device using the console port.
4.2.1 IMPROPER PHYSICAL ACCESS CONTROL CWE-1263 An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the devices authentication files to create a new user and gain full access to the system. CVE-2023-1257has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could gain access to the CPU module and the OPC UA server module. CVE-2022-25164 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.2CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29826 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.3USE OF HARD-CODED PASSWORD CWE-259 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. CVE-2022-29825 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.4USE OF HARD-CODED PASSWORD CWE-259 If this vulnerability is exploited, unauthorized users could obtain information about the safety CPU module project file. CVE-2022-29831 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.5INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could access the safety CPU module. CVE-2022-29833 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N). 4.2.6USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29827 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.7USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29828 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.8USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29829 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.9USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be tampered with or disclosed. As a result, information about project files could be obtained without permission by unauthorized users. CVE-2022-29830 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.10CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could obtain information about the safety CPU module or project file for MELSEC Q/FX/L series with security setting. CVE-2022-29832 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Successful exploitation of these vulnerabilities could allow unauthorized users to gain access to the MELSEC iQ-R/F/L series CPU modules and the MELSEC iQ-R series OPC UA server module or to view and execute programs or view project files without permissions.
4.2.1CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could gain access to the CPU module and the OPC UA server module. CVE-2022-25164 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.2CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29826 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.3USE OF HARD-CODED PASSWORD CWE-259 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. CVE-2022-29825 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). 4.2.4USE OF HARD-CODED PASSWORD CWE-259 If this vulnerability is exploited, unauthorized users could obtain information about the safety CPU module project file. CVE-2022-29831 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.5INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could access the safety CPU module. CVE-2022-29833 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N). 4.2.6USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29827 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.7USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29828 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.8USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view or execute programs. CVE-2022-29829 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N). 4.2.9USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 If this vulnerability is exploited, sensitive information could be tampered with or disclosed. As a result, information about project files could be obtained without permission by unauthorized users. CVE-2022-29830 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). 4.2.10CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could obtain information about the safety CPU module or project file for MELSEC Q/FX/L series with security setting. CVE-2022-29832 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 A malicious attacker may cause a denial-of-service condition by spoofing MELSEC, GOT, or FREQROL, and returning crafted reply packets. CVE-2021-20587 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130 A malicious attacker may cause a denial-of-service condition by spoofing MELSEC, GOT, or FREQROL, and returning crafted reply packets. CVE-2021-20588 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities may cause a denial-of-service condition.
4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 A malicious attacker may cause a denial-of-service condition by spoofing MELSEC, GOT, or FREQROL, and returning crafted reply packets. CVE-2021-20587 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130 A malicious attacker may cause a denial-of-service condition by spoofing MELSEC, GOT, or FREQROL, and returning crafted reply packets. CVE-2021-20588 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-20-212-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition. CVE-2020-14521 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability may allow an attacker to obtain unauthorized information, modify information, and cause a denial-of-service condition.
4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition. CVE-2020-14521 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. CVE-2022-3084 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. CVE-2022-2952 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. CVE-2022-2948 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 UNTRUSTED POINTER DEREFERENCE CWE-822 The affected product is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. CVE-2022-2002 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. CVE-2022-3092 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could crash the device being accessed or allow arbitrary code execution.
3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. CVE-2022-3084 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. CVE-2022-2952 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.3 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. CVE-2022-2948 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.4 UNTRUSTED POINTER DEREFERENCE CWE-822 The affected product is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. CVE-2022-2002 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.5 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. CVE-2022-3092 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 In AVEVA Edge versions R2020 and prior could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking the AVEVA Edge InstallShield package to load an unsafe DLL. This attack is only possible during the installation or when performing an install or repair operation. CVE-2016-2542 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 AVEVA Edge versions R2020 and prior could allow internal network scanning and expose sensitive device information. CVE-2021-42794 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.3 IMPROPER ACCESS CONTROL CWE-284 AVEVA Edge versions R2020 and prior could allow unauthenticated arbitrary commands to be executed with the security context of the StADOSvr.exe process. In most instances, this will be a standard-privileged user account under which the AVEVA Edge runtime was started. It's possible for a high-privileged service account to have been configured and assigned for running AVEVA Edge runtime. CVE-2021-42796 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.4 PATH TRAVERSAL: '\\UNC\SHARE\NAME\' (WINDOWS UNC SHARE) CWE-40 AVEVA Edge versions R2020 and prior could allow an unauthenticated actor to trick the AVEVA Edge runtime into disclosing a Windows access token of the user account configured for accessing external DB resources. CVE-2021-42797 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to insert malicious DLL files and trick the application into executing code.
3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 In AVEVA Edge versions R2020 and prior could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking the AVEVA Edge InstallShield package to load an unsafe DLL. This attack is only possible during the installation or when performing an install or repair operation. CVE-2016-2542 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 AVEVA Edge versions R2020 and prior could allow internal network scanning and expose sensitive device information. CVE-2021-42794 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). 3.2.3 IMPROPER ACCESS CONTROL CWE-284 AVEVA Edge versions R2020 and prior could allow unauthenticated arbitrary commands to be executed with the security context of the StADOSvr.exe process. In most instances, this will be a standard-privileged user account under which the AVEVA Edge runtime was started. It's possible for a high-privileged service account to have been configured and assigned for running AVEVA Edge runtime. CVE-2021-42796 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.4 PATH TRAVERSAL: '\\UNC\SHARE\NAME\' (WINDOWS UNC SHARE) CWE-40 AVEVA Edge versions R2020 and prior could allow an unauthenticated actor to trick the AVEVA Edge runtime into disclosing a Windows access token of the user account configured for accessing external DB resources. CVE-2021-42797 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In Phoenix Contact Automation Worx Software Suite up to version 1.89, manipulated PC Worx or Config+ files could lead to a heap buffer overflow or a read access violation. Availability, integrity, or confidentiality of an application programming workstation could be compromised by attacks using these vulnerabilities. CVE-2022-3461 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 In Phoenix Contact Automation Worx Software Suite up to version 1.89, unauthorized users could read memory beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation could be compromised by attacks using these vulnerabilities. CVE-2022-3737 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could lead to a heap buffer overflow, release of unallocated memory, or a read access violation.
3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In Phoenix Contact Automation Worx Software Suite up to version 1.89, manipulated PC Worx or Config+ files could lead to a heap buffer overflow or a read access violation. Availability, integrity, or confidentiality of an application programming workstation could be compromised by attacks using these vulnerabilities. CVE-2022-3461 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 In Phoenix Contact Automation Worx Software Suite up to version 1.89, unauthorized users could read memory beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation could be compromised by attacks using these vulnerabilities. CVE-2022-3737 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Digital Alert Systems DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability where remote attackers could inject arbitrary web script or HTML code via the username field of the login page or the HTTP host header. The injected content is stored in logs and rendered when viewed in the web application. CVE-2019-18265 has been assigned to this vulnerability. A CVSS v3 base score of 4.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Affected versions of Digital Alert Systems DASDEC software contain a XSS vulnerability via the Host Header in undisclosed pages after login. CVE-2022-40204 has been assigned to this vulnerability. A CVSS v3 base score of 4.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N).
Successful exploitation of these vulnerabilities might result in false alerts being issued to broadcast or cable sites that are immediately connected to the compromised system.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Digital Alert Systems DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability where remote attackers could inject arbitrary web script or HTML code via the username field of the login page or the HTTP host header. The injected content is stored in logs and rendered when viewed in the web application. CVE-2019-18265 has been assigned to this vulnerability. A CVSS v3 base score of 4.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). 3.2.2 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Affected versions of Digital Alert Systems DASDEC software contain a XSS vulnerability via the Host Header in undisclosed pages after login. CVE-2022-40204 has been assigned to this vulnerability. A CVSS v3 base score of 4.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 The affected devices and versions of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges. CVE-2022-3088 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could provide an attacker with root privileges and total control of the system.
3.2.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 The affected devices and versions of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges. CVE-2022-3088 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-321-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes. CVE-2022-3090 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow an attacker to obtain user credential hashes.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes. CVE-2022-3090 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-321-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and priorare vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. CVE-2022-3086 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow an attacker to execute code and native system commands.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and priorare vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. CVE-2022-3086 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-319-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OS COMMAND INJECTION CWE-78 A malicious OS command execution vulnerability in OpenSSL affects Mitsubishi Electric GT SoftGOT2000. If an attacker sends a specially crafted certificate, then this vulnerability could allow an attacker to execute malicious OS commands. CVE-2022-2068 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to execute malicious OS commands.
3.2.1 OS COMMAND INJECTION CWE-78 A malicious OS command execution vulnerability in OpenSSL affects Mitsubishi Electric GT SoftGOT2000. If an attacker sends a specially crafted certificate, then this vulnerability could allow an attacker to execute malicious OS commands. CVE-2022-2068 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-350-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 The affected product is vulnerable to insufficiently protected keys required for decrypting intellectual property data, which could allow an attacker to discover the keys and bypass the protection intended by IEEE 1735 standard. CVE-2021-42023 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow access to unencrypted data.
4.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 The affected product is vulnerable to insufficiently protected keys required for decrypting intellectual property data, which could allow an attacker to discover the keys and bypass the protection intended by IEEE 1735 standard. CVE-2021-42023 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-350-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 4.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1248 The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on a user-defined applications that runs on top of the UDP protocol. CVE-2021-31345 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1248 The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31346 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.4 OUT-OF-BOUNDS READ CWE-125 When processing a DHCP OFFER message, the DHCP client application does not validate the length of the vendor option(s), leading to denial-of-service conditions. CVE-2021-31881 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.5 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The DHCP client application does not validate the length of the domain name server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to denial-of-service conditions. CVE-2021-31882 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.6 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 When processing a DHCP ACK message, the DHCP client application does not validate the length of the vendor option(s), leading to denial-of-service conditions. CVE-2021-31883 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.7 IMPROPER NULL TERMINATION CWE-170 The DHCP client application assumes that the data supplied with the Hostname DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to out-of-bound reads, writes, and denial-of-service conditions. CVE-2021-31884 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update A part 1 of 1 --------- Siemens has determined that Capital VSTAR is not affected by CVE-2021-31884. --------- End Update A part 1 of 1 --------- 4.2.8 INTEGER UNDERFLOW CWE-191 Malformed TCP packets with a corrupted SACK option leads to information leaks and denial-of-service conditions. CVE-2021-31889 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N). 4.2.9 IMPROPER HANDLING OF INCONSISTENT STRUCTURAL ELEMENTS CWE-240 The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31890 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could be leveraged by an attacker to initiate a crash, information leak, denial-of-service conditions, or remote code execution.
4.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). 4.2.2 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1248 The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on a user-defined applications that runs on top of the UDP protocol. CVE-2021-31345 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 4.2.3 IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT CWE-1248 The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31346 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.4 OUT-OF-BOUNDS READ CWE-125 When processing a DHCP OFFER message, the DHCP client application does not validate the length of the vendor option(s), leading to denial-of-service conditions. CVE-2021-31881 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.5 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The DHCP client application does not validate the length of the domain name server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to denial-of-service conditions. CVE-2021-31882 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.6 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 When processing a DHCP ACK message, the DHCP client application does not validate the length of the vendor option(s), leading to denial-of-service conditions. CVE-2021-31883 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H). 4.2.7 IMPROPER NULL TERMINATION CWE-170 The DHCP client application assumes that the data supplied with the Hostname DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to out-of-bound reads, writes, and denial-of-service conditions. CVE-2021-31884 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update A part 1 of 1 --------- Siemens has determined that Capital VSTAR is not affected by CVE-2021-31884. --------- End Update A part 1 of 1 --------- 4.2.8 INTEGER UNDERFLOW CWE-191 Malformed TCP packets with a corrupted SACK option leads to information leaks and denial-of-service conditions. CVE-2021-31889 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N). 4.2.9 IMPROPER HANDLING OF INCONSISTENT STRUCTURAL ELEMENTS CWE-240 The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory. CVE-2021-31890 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-228-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 --------- Begin Update A part 2 of 3 --------- Passwords are not adequately encrypted during the communication process between the affected versions of LS ELECTRIC's XG5000 software and the affected LS ELECTRIC PLCs. This could allow an attacker to identify and decrypt the affected PLC password by sniffing the traffic. --------- End Update A part 2 of 3 --------- CVE-2022-2758 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerability could allow an attacker to decrypt credentials and gain full access to the affected programmable logic controller (PLC).
4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 --------- Begin Update A part 2 of 3 --------- Passwords are not adequately encrypted during the communication process between the affected versions of LS ELECTRIC's XG5000 software and the affected LS ELECTRIC PLCs. This could allow an attacker to identify and decrypt the affected PLC password by sniffing the traffic. --------- End Update A part 2 of 3 --------- CVE-2022-2758 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 In affected versions of Siemens SCALANCE X-200 and X-200IRT device families, an attacker could steal session cookies and hijack user sessions by using a cross-site scripting vulnerability. --------- Begin Update A part 2 of 2 --------- CVE-2022-40631 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). --------- End Update A part 2 of 2 ---------
Successful exploitation of this vulnerability could allow an attacker to steal session cookies and hijack a session.
4.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 In affected versions of Siemens SCALANCE X-200 and X-200IRT device families, an attacker could steal session cookies and hijack user sessions by using a cross-site scripting vulnerability. --------- Begin Update A part 2 of 2 --------- CVE-2022-40631 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). --------- End Update A part 2 of 2 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-22-258-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of this vulnerability could occupy all available HTTP connections and cause a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutShift API. CVE-2022-41701has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.2IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PostEnergyType API. CVE-2022-40965has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.3IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutLineMessageSetting API. CVE-2022-41555has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.4IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the InsertReg API. CVE-2022-41702has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.5IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the SetPF API. CVE-2022-41651has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.6IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in CheckIoTHubNameExisted. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-40967has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.7IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in GetDIAE_line_message_settingsListParameters. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41133has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.8IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in CheckDIACloud. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41773has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.9 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in Handler_CFG.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41775has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.10 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in AM_EBillAnalysis.aspx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43447has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.11 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in HandlerTag_KID.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43506has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.12 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in HandlerPage_KID.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43457has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.13 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in FtyInfoSetting.aspx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43452has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update B part 4 of 5 --------- 4.3.14IMPROPER AUTHORIZATION CWE-285 The affected product DIAEnergie (versions prior to v1.9.03.001) contains improper authorization, which could allow an unauthorized user to bypass authorization and access privileged functionality. CVE-2023-0822has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). --------- End Update B part 4 of 5 ---------
Successful exploitation of these vulnerabilities could allow an attacker to inject arbitrary code to retrieve and modify database contents and execute system commands.
4.2.1IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutShift API. CVE-2022-41701has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.2IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PostEnergyType API. CVE-2022-40965has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.3IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutLineMessageSetting API. CVE-2022-41555has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.4IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the InsertReg API. CVE-2022-41702has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.5IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the SetPF API. CVE-2022-41651has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). 4.2.6IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in CheckIoTHubNameExisted. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-40967has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.7IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in GetDIAE_line_message_settingsListParameters. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41133has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.8IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in CheckDIACloud. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41773has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.9 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in Handler_CFG.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-41775has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.10 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in AM_EBillAnalysis.aspx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43447has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.11 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in HandlerTag_KID.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43506has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.12 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in HandlerPage_KID.ashx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43457has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 4.2.13 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product DIAEnergie (versions prior to v1.9.02.001) is vulnerable to a SQL injection that exists in FtyInfoSetting.aspx. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries. CVE-2022-43452has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). --------- Begin Update B part 4 of 5 --------- 4.3.14IMPROPER AUTHORIZATION CWE-285 The affected product DIAEnergie (versions prior to v1.9.03.001) contains improper authorization, which could allow an unauthorized user to bypass authorization and access privileged functionality. CVE-2023-0822has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). --------- End Update B part 4 of 5 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 In Siemens SINEC NMS logback version 1.2.7 and prior, an attacker with the required privileges to edit configuration files could craft malicious packages allowing the execution arbitrary code loaded from LDAP servers. CVE-2021-42550 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow attackers with write access to the logback configuration file to execute arbitrary code on the system.
3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 In Siemens SINEC NMS logback version 1.2.7 and prior, an attacker with the required privileges to edit configuration files could craft malicious packages allowing the execution arbitrary code loaded from LDAP servers. CVE-2021-42550 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 All versions of Siemens SINUMERIK ONE and SINUMERIK MC use an insecure method to store authentication credentials, which are therefore susceptible to being retrieved. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow attackers to discover the private key of a given CPU product family via an offline attack against a single CPU from the family. Attackers could then use this knowledge to extract confidential configuration data from projects.
3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 All versions of Siemens SINUMERIK ONE and SINUMERIK MC use an insecure method to store authentication credentials, which are therefore susceptible to being retrieved. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected Siemens RUGGEDCOM ROS devices improperly handle partial HTTP requests, which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of this vulnerability could cause a denial-of-service condition where the affected web servers wait for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected Siemens RUGGEDCOM ROS devices improperly handle partial HTTP requests, which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated. the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 All versions of Siemens QMS Automotive contain a vulnerability that stores user credentials in plaintext inside the user database. This could allow an attacker to read credentials from memory. CVE-2022-43958 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).
Successful exploitation of this vulnerability could allow an attacker to read credentials and impersonate authorized users.
3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 All versions of Siemens QMS Automotive contain a vulnerability that stores user credentials in plaintext inside the user database. This could allow an attacker to read credentials from memory. CVE-2022-43958 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers (not actual public keys) and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client requires few CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. CVE-2002-20001 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37885 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37886 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.4CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37887 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37888 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37889 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7CLASSIC BUFFER OVERFLOW CWE-120 An unauthenticated buffer overflow vulnerability exists within the web management interface. Successful exploitation could result in the execution of arbitrary commands on the underlying operating system. CVE-2022-37890 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8CLASSIC BUFFER OVERFLOW CWE-120 An unauthenticated buffer overflow vulnerability exists within the web management interface. Successful exploitation could result in the execution of arbitrary commands on the underlying operating system. CVE-2022-37891 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.9CROSS-SITE SCRIPTING CWE-79 A vulnerability in the web management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface. CVE-2022-37892 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 3.2.10CROSS-SITE SCRIPTING CWE-79 A vulnerability in the web management interface could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface. CVE-2022-37896 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 3.2.11 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the command line interface. Successful exploitation of this vulnerability could result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. CVE-2022-37893 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.12IMPROPER INPUT VALIDATION CWE-20 An unauthenticated denial of service (DoS) vulnerability exists in the handling of certain SSID strings. Successful exploitation of this vulnerability could result in the ability to interrupt the normal operation of the affected Access Point. CVE-2022-37894 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.13IMPROPER INPUT VALIDATION CWE-20 An authenticated denial of service (DoS) vulnerability exists in the web management interface. Successful exploitation of this vulnerability could result in the ability to interrupt the normal operation of the affected Access Point. CVE-2022-37895 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to inject commands or exploit buffer overflow vulnerabilities, which could lead to denial of service, unauthenticated remote code execution. or stored XSS.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers (not actual public keys) and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client requires few CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. CVE-2002-20001 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.2CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37885 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37886 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.4CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37887 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.5CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37888 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.6CLASSIC BUFFER OVERFLOW CWE-120 A buffer overflow vulnerability in an underlying service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI UDP port (8211). CVE-2022-37889 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.7CLASSIC BUFFER OVERFLOW CWE-120 An unauthenticated buffer overflow vulnerability exists within the web management interface. Successful exploitation could result in the execution of arbitrary commands on the underlying operating system. CVE-2022-37890 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8CLASSIC BUFFER OVERFLOW CWE-120 An unauthenticated buffer overflow vulnerability exists within the web management interface. Successful exploitation could result in the execution of arbitrary commands on the underlying operating system. CVE-2022-37891 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.9CROSS-SITE SCRIPTING CWE-79 A vulnerability in the web management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface. CVE-2022-37892 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 3.2.10CROSS-SITE SCRIPTING CWE-79 A vulnerability in the web management interface could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface. CVE-2022-37896 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). 3.2.11 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the command line interface. Successful exploitation of this vulnerability could result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. CVE-2022-37893 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.12IMPROPER INPUT VALIDATION CWE-20 An unauthenticated denial of service (DoS) vulnerability exists in the handling of certain SSID strings. Successful exploitation of this vulnerability could result in the ability to interrupt the normal operation of the affected Access Point. CVE-2022-37894 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.13IMPROPER INPUT VALIDATION CWE-20 An authenticated denial of service (DoS) vulnerability exists in the web management interface. Successful exploitation of this vulnerability could result in the ability to interrupt the normal operation of the affected Access Point. CVE-2022-37895 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 OUT-OF-BOUNDS READ CWE-125 Siemens Parasolid contains an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-39157 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 Siemens Parasolid contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-43397 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3.2.1 OUT-OF-BOUNDS READ CWE-125 Siemens Parasolid contains an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-39157 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 Siemens Parasolid contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-43397 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priors web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. --------- Begin Update A Part 2 of 5 --------- CVE-2022-3703 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). --------- End Update A Part 2 of 5 --------- 4.2.2 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priors application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more. --------- Begin Update A Part 3 of 5 --------- CVE-2022-41607 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). --------- End Update A Part 3 of 5 --------- 4.2.3 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device. --------- Begin Update A Part 4 of 5 --------- CVE-2022-40981 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L). --------- End Update A Part 4 of 5 ---------
Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information and compromise the vulnerable device and other connected machines.
4.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priors web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. --------- Begin Update A Part 2 of 5 --------- CVE-2022-3703 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). --------- End Update A Part 2 of 5 --------- 4.2.2 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priors application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more. --------- Begin Update A Part 3 of 5 --------- CVE-2022-41607 has been assigned to this vulnerability. A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). --------- End Update A Part 3 of 5 --------- 4.2.3 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device. --------- Begin Update A Part 4 of 5 --------- CVE-2022-40981 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L). --------- End Update A Part 4 of 5 ---------
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The software uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within the pathname, which can cause the pathname to resolve to a location outside of the restricted directory. CVE-2022-2969 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to place malicious code on the target device.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The software uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within the pathname, which can cause the pathname to resolve to a location outside of the restricted directory. CVE-2022-2969 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL FOR VOLATILE MEMORY CONTAINING BOOT CODE CWE-1274 A vulnerability exists in Nokias ASIK AirScale system module (versions 474021A.101 and 474021A.102) that could allow an attacker to place a script on the file system accessible from Linux. A script placed in the appropriate place could allow for arbitrary code execution in the bootloader. CVE-2022-2482 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H). 3.2.2 IMPROPER ACCESS CONTROL FOR VOLATILE MEMORY CONTAINING BOOT CODE CWE-1274 The signature check in the Nokia ASIK AirScale system module version 474021A.101 can be bypassed allowing an attacker to run modified firmware. This could result in the execution of a malicious kernel, arbitrary programs, or modified Nokia programs. CVE-2022-2484 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H). 3.2.3 ASSUMED-IMMUTABLE DATA IS STORED IN WRITABLE MEMORY CWE-1282 The bootloader in the Nokia ASIK AirScale system module (versions 474021A.101 and 474021A.102) loads public keys for firmware verification signature. If an attacker modifies the flash contents to corrupt the keys, secure boot could be permanently disabled on a given device. CVE-2022-2483 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H).
Successful exploitation of these vulnerabilities could result in the execution of a malicious kernel, running of arbitrary malicious programs, or running of modified Nokia programs.
3.2.1 IMPROPER ACCESS CONTROL FOR VOLATILE MEMORY CONTAINING BOOT CODE CWE-1274 A vulnerability exists in Nokias ASIK AirScale system module (versions 474021A.101 and 474021A.102) that could allow an attacker to place a script on the file system accessible from Linux. A script placed in the appropriate place could allow for arbitrary code execution in the bootloader. CVE-2022-2482 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H). 3.2.2 IMPROPER ACCESS CONTROL FOR VOLATILE MEMORY CONTAINING BOOT CODE CWE-1274 The signature check in the Nokia ASIK AirScale system module version 474021A.101 can be bypassed allowing an attacker to run modified firmware. This could result in the execution of a malicious kernel, arbitrary programs, or modified Nokia programs. CVE-2022-2484 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H). 3.2.3 ASSUMED-IMMUTABLE DATA IS STORED IN WRITABLE MEMORY CWE-1282 The bootloader in the Nokia ASIK AirScale system module (versions 474021A.101 and 474021A.102) loads public keys for firmware verification signature. If an attacker modifies the flash contents to corrupt the keys, secure boot could be permanently disabled on a given device. CVE-2022-2483 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A vulnerability in OpenSSL creates the potential for OS command injection in the affected product, which could lead to arbitrary code execution. CVE-2022-1292 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could create a denial-of-service condition or enable arbitrary code execution.
4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 A vulnerability in OpenSSL creates the potential for OS command injection in the affected product, which could lead to arbitrary code execution. CVE-2022-1292 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER ACCESS CONTROL CWE-284 An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and Events service could open a connection, causing the service to fault and become unavailable. The affected port could be used as a server ping port and uses messages structured with XML. CVE-2022-38744 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could result in a denial-of-service condition causing the server to be unavailable.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and Events service could open a connection, causing the service to fault and become unavailable. The affected port could be used as a server ping port and uses messages structured with XML. CVE-2022-38744 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 SAUTER Controls moduWeb firmware version 2.7.1 is vulnerable to reflective cross-site scripting (XSS). The web application does not adequately sanitize request strings of malicious JavaScript. An attacker utilizing XSS could then execute malicious code in users browsers and steal sensitive information, including user credentials. CVE-2022-40190 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to trick users into clicking on malicious links and steal sensitive information.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 SAUTER Controls moduWeb firmware version 2.7.1 is vulnerable to reflective cross-site scripting (XSS). The web application does not adequately sanitize request strings of malicious JavaScript. An attacker utilizing XSS could then execute malicious code in users browsers and steal sensitive information, including user credentials. CVE-2022-40190 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1INCORRECT AUTHORIZATION CWE-863 The administrator graphical user interface (GUI) lacks correct handling of RBAC, which may allow a malicious user to send modified HTTP requests to the targeted device. If exploited, a read-only remote attacker could potentially execute commands or configuration changes as the administrator. CVE-2020-3229 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2IMPROPER INPUT VALIDATION CWE-20 Due to insufficient validation of user input, this vulnerability could allow a malicious user to inject custom input into the web user interface. If exploited, a remote attacker could potentially execute arbitrary code with administrative privileges on the operating system. CVE-2020-3219 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.3IMPROPER CHECK FOR UNUSUAL OR EXCEPTIONAL CONDITIONS CWE-754 A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE software could allow an unauthenticated, remote attacker to reload an affected device. CVE-2021-1446 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). 3.2.4INTERPRETATION CONFLICT CWE-436 A vulnerability in the Secure Shell (SSH) server code of Cisco IOS software and Cisco IOS XE software could allow an authenticated, remote attacker to reload an affected device. CVE-2020-3200 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). 3.2.5IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 Due to improper input sanitization, this vulnerability could allow a malicious user with administrative privileges to submit specially crafted input in the web user interface. If exploited, a remote attacker could potentially execute arbitrary commands with root privileges on the operating system. CVE-2020-3211 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 3.2.6IMPROPER INPUT VALIDATION CWE-20 Due to improper validation of user supplied input, a malicious user could potentially create a file on the target device and upload a second malicious file to the device. If exploited, a user could execute arbitrary code with root privileges on the underlying Linux shell. CVE-2020-3218 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 3.2.7IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347 During the initial boot process, there is an improper check on the area code managing the verification of the digital signatures of the system files. If exploited, a malicious user could potentially install and boot malicious software images or execute unsigned binaries on the targeted device. A malicious user could exploit this vulnerability by loading unsigned software on the affected device. CVE-2020-3209 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. CVE-2021-1385 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). 3.2.9IMPROPER INPUT VALIDATION CWE-20 A vulnerability in the web server authentication of Cisco IOS XE Software could allow an authenticated, remote attacker to crash the web server on the device. CVE-2020-3516 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
Successful exploitation of these vulnerabilities could lead to a denial-of-service condition and allow remote code execution.
3.2.1INCORRECT AUTHORIZATION CWE-863 The administrator graphical user interface (GUI) lacks correct handling of RBAC, which may allow a malicious user to send modified HTTP requests to the targeted device. If exploited, a read-only remote attacker could potentially execute commands or configuration changes as the administrator. CVE-2020-3229 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2IMPROPER INPUT VALIDATION CWE-20 Due to insufficient validation of user input, this vulnerability could allow a malicious user to inject custom input into the web user interface. If exploited, a remote attacker could potentially execute arbitrary code with administrative privileges on the operating system. CVE-2020-3219 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.3IMPROPER CHECK FOR UNUSUAL OR EXCEPTIONAL CONDITIONS CWE-754 A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE software could allow an unauthenticated, remote attacker to reload an affected device. CVE-2021-1446 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). 3.2.4INTERPRETATION CONFLICT CWE-436 A vulnerability in the Secure Shell (SSH) server code of Cisco IOS software and Cisco IOS XE software could allow an authenticated, remote attacker to reload an affected device. CVE-2020-3200 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). 3.2.5IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 Due to improper input sanitization, this vulnerability could allow a malicious user with administrative privileges to submit specially crafted input in the web user interface. If exploited, a remote attacker could potentially execute arbitrary commands with root privileges on the operating system. CVE-2020-3211 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 3.2.6IMPROPER INPUT VALIDATION CWE-20 Due to improper validation of user supplied input, a malicious user could potentially create a file on the target device and upload a second malicious file to the device. If exploited, a user could execute arbitrary code with root privileges on the underlying Linux shell. CVE-2020-3218 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 3.2.7IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347 During the initial boot process, there is an improper check on the area code managing the verification of the digital signatures of the system files. If exploited, a malicious user could potentially install and boot malicious software images or execute unsigned binaries on the targeted device. A malicious user could exploit this vulnerability by loading unsigned software on the affected device. CVE-2020-3209 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.8IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. CVE-2021-1385 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). 3.2.9IMPROPER INPUT VALIDATION CWE-20 A vulnerability in the web server authentication of Cisco IOS XE Software could allow an authenticated, remote attacker to crash the web server on the device. CVE-2020-3516 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1IMPROPER INPUT VALIDATION CWE-20 A specifically malformed HTTP request could cause the affected VTScada to crash. Both local area network (LAN)-only and internet facing systems are affected. CVE-2022-3181 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could cause a denial-of-service condition in the affected product.
3.2.1IMPROPER INPUT VALIDATION CWE-20 A specifically malformed HTTP request could cause the affected VTScada to crash. Both local area network (LAN)-only and internet facing systems are affected. CVE-2022-3181 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 A vulnerability exists when Hitachi Energy MicroSCADA X DMS600 v4.5 uses an affected version of PostgreSQL. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. Successful exploitation of this vulnerability could allow attackers to gain access to the data, causing confidentiality and integrity issues. CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 A vulnerability exists when Hitachi Energy MicroSCADA X DMS600 v4.5 uses an affected version of PostgreSQL. When using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of this vulnerabilities could allow an attacker to gain unauthorized access to information.
3.2.1RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 A vulnerability exists when Hitachi Energy MicroSCADA X DMS600 v4.5 uses an affected version of PostgreSQL. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. Successful exploitation of this vulnerability could allow attackers to gain access to the data, causing confidentiality and integrity issues. CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). 3.2.2RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 A vulnerability exists when Hitachi Energy MicroSCADA X DMS600 v4.5 uses an affected version of PostgreSQL. When using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product, all CKS CEVAS versions prior to 1.01.46, is vulnerable to cross-site scripting; this could allow an attacker to retrieve data with specially crafted SQL queries. CVE-2021-36206 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product, all CKS CEVAS versions prior to 1.01.46, is vulnerable to cross-site scripting; this could allow an attacker to retrieve data with specially crafted SQL queries. CVE-2021-36206 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 WEAK AUTHENTICATION CWE-1390 Siemens Siveillance Video Mobile Server versions prior to V22.2a(80) contain an authentication bypass vulnerability that could allow an unauthenticated remote attacker to access the application without a valid account. CVE-2022-43400 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L).
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to access the application without a valid account.
3.2.1 WEAK AUTHENTICATION CWE-1390 Siemens Siveillance Video Mobile Server versions prior to V22.2a(80) contain an authentication bypass vulnerability that could allow an unauthenticated remote attacker to access the application without a valid account. CVE-2022-43400 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Authentication is currently unsupported in Haas Controller version 100.20.000.1110 when using the Ethernet Q Commands service, which allows any user on the same network segment as the controller (even while connected remotely) to access the service and write unauthorized macros to the device. CVE-2022-2474 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 INSUFFICIENT GRANULARITY OF ACCESS CONTROL CWE-1220 Haas Controller version 100.20.000.1110 has insufficient granularity of access control when using the "Ethernet Q Commands" service. Any user is able to write macros into registers outside of the authorized accessible range. This could allow a user to access privileged resources or resources out of context. CVE-2022-2475 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Communication traffic involving "Ethernet Q Commands" service of Haas Controller version 100.20.000.1110 is transmitted in cleartext. This allows an attacker to obtain sensitive information being passed to and from the controller. CVE-2022-41636 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of these vulnerabilities could allow an unauthorized attacker to cause denial-of-service of the production line, damage the tools used in the production line, introduce defects in pieces of the production line, and perform remote code execution.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Authentication is currently unsupported in Haas Controller version 100.20.000.1110 when using the Ethernet Q Commands service, which allows any user on the same network segment as the controller (even while connected remotely) to access the service and write unauthorized macros to the device. CVE-2022-2474 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 INSUFFICIENT GRANULARITY OF ACCESS CONTROL CWE-1220 Haas Controller version 100.20.000.1110 has insufficient granularity of access control when using the "Ethernet Q Commands" service. Any user is able to write macros into registers outside of the authorized accessible range. This could allow a user to access privileged resources or resources out of context. CVE-2022-2475 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 Communication traffic involving "Ethernet Q Commands" service of Haas Controller version 100.20.000.1110 is transmitted in cleartext. This allows an attacker to obtain sensitive information being passed to and from the controller. CVE-2022-41636 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER AUTHENTICATION CWE-287 The HEIDENHAIN Controller TNC 640, version 340590 07 SP5, running HEROS 5.08.3 controlling the HARTFORD 5A-65E CNC machine is vulnerable to improper authentication, which may allow an attacker to deny service to the production line, steal sensitive data from the production line, and alter any products created by the production line. CVE-2022-41648 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could cause a loss of sensitive data, manipulation of information, and denial-of-service.
3.2.1 IMPROPER AUTHENTICATION CWE-287 The HEIDENHAIN Controller TNC 640, version 340590 07 SP5, running HEROS 5.08.3 controlling the HARTFORD 5A-65E CNC machine is vulnerable to improper authentication, which may allow an attacker to deny service to the production line, steal sensitive data from the production line, and alter any products created by the production line. CVE-2022-41648 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-293-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. CVE-2022-40201 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read when parsing DGN files, which may allow an attacker to crash the product, disclose sensitive information, or execute arbitrary code. CVE-2022-41613 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities may crash the device being accessed or allow remote arbitrary code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. CVE-2022-40201 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.2.2 OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read when parsing DGN files, which may allow an attacker to crash the product, disclose sensitive information, or execute arbitrary code. CVE-2022-41613 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-291-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. CVE-2022-3387 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.2 STACK-BASED BUFFER OVERFLOW CWE-121 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. CVE-2022-3386 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 STACK-BASED BUFFER OVERFLOW CWE-121 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution. CVE-2022-3385has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could result in an unauthorized attacker remotely deleting files on the system or allowing remote code execution.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. CVE-2022-3387 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). 3.2.2 STACK-BASED BUFFER OVERFLOW CWE-121 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. CVE-2022-3386 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.3 STACK-BASED BUFFER OVERFLOW CWE-121 Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution. CVE-2022-3385has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-287-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The web interface for RAPConsole lacks Anti-CSRF protections in place for state-changing operations. This can be exploited by an attacker to reboot the affected device if the attacker can convince a user to visit a specially crafted webpage. CVE-2019-5318 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H). 4.2.2 OS COMMAND INJECTION CWE-78 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2020-37719 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 CLASSIC BUFFER OVERFLOW CWE-120 There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP Port (8211) of devices running ArubaOS. This may allow for denial-of-service attacks and/or remote code execution in the underlying operating system. CVE-2021-37716 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.4 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS web-based management user interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37717 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.5 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS web-based management user interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37718 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.6 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37720 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.7 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37721 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.8 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37722 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.9 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. This vulnerability is only present in instances of the Mobility Conductor. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the Mobility Conductor running ArubaOS. CVE-2021-37723 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.10 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. This vulnerability is only present in instances of the Mobility Conductor. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the Mobility Conductor running ArubaOS. CVE-2021-37724 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.11 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 A vulnerability in the web-based management interface of ArubaOS could allow an unauthenticated remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack against a vulnerable system. Successful exploitation of this vulnerability would consist of an attacker persuading an authorized user to follow a malicious link, resulting in the deletion of arbitrary files with the privilege level of the targeted user. CVE-2021-37725 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N). 4.2.12 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to impact the integrity of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification of sensitive data. CVE-2021-37728 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 4.2.13 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in the ability to impact the integrity of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification of sensitive data. CVE-2021-37729 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 4.2.14 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An authenticated local path traversal vulnerability exists in the ArubaOS web-based management interface and CLI. This vulnerability only affects physical hardware controllers such as the 9000 series and 7x00 series. Successful exploitation of this vulnerability requires physical access to the controller and results in the ability to impact the integrity and confidentiality of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification or disclosure of sensitive data. CVE-2021-37731 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C). 4.2.15 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files. CVE-2021-37733 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to inject commands or trigger buffer overflows.
4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The web interface for RAPConsole lacks Anti-CSRF protections in place for state-changing operations. This can be exploited by an attacker to reboot the affected device if the attacker can convince a user to visit a specially crafted webpage. CVE-2019-5318 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H). 4.2.2 OS COMMAND INJECTION CWE-78 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2020-37719 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 CLASSIC BUFFER OVERFLOW CWE-120 There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP Port (8211) of devices running ArubaOS. This may allow for denial-of-service attacks and/or remote code execution in the underlying operating system. CVE-2021-37716 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.4 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS web-based management user interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37717 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.5 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS web-based management user interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37718 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.6 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37720 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.7 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37721 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.8 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. CVE-2021-37722 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.9 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. This vulnerability is only present in instances of the Mobility Conductor. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the Mobility Conductor running ArubaOS. CVE-2021-37723 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.10 COMMAND INJECTION CWE-77 An authenticated command injection vulnerability exists in the ArubaOS command line interface. This vulnerability is only present in instances of the Mobility Conductor. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the Mobility Conductor running ArubaOS. CVE-2021-37724 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.11 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 A vulnerability in the web-based management interface of ArubaOS could allow an unauthenticated remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack against a vulnerable system. Successful exploitation of this vulnerability would consist of an attacker persuading an authorized user to follow a malicious link, resulting in the deletion of arbitrary files with the privilege level of the targeted user. CVE-2021-37725 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N). 4.2.12 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to impact the integrity of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification of sensitive data. CVE-2021-37728 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 4.2.13 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in the ability to impact the integrity of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification of sensitive data. CVE-2021-37729 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). 4.2.14 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 An authenticated local path traversal vulnerability exists in the ArubaOS web-based management interface and CLI. This vulnerability only affects physical hardware controllers such as the 9000 series and 7x00 series. Successful exploitation of this vulnerability requires physical access to the controller and results in the ability to impact the integrity and confidentiality of critical files on the underlying operating system. This allows an attacker to impact the availability of the ArubaOS instance and may allow for modification or disclosure of sensitive data. CVE-2021-37731 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C). 4.2.15 PATH TRAVERSAL CWE-22 An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files. CVE-2021-37733 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP). Successful exploitation could allow for unauthenticated remote code execution, potentially resulting in the execution of arbitrary code as a privileged user on the underlying system. CVE-2021-37726 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) command line interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37727 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) command line interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37730 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) web-based management user interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37732 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.5 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 An authenticated arbitrary file read access vulnerability was discovered in Aruba Instant Access Points. Successful exploitation could lead to an attacker reading any file off the underlying filesystem, including system sensitive files. CVE-2021-37734 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 4.2.6 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A remote denial of service vulnerability was discovered in Aruba Instant through the command line interface. Successful exploitation could create a denial-of-service condition, leading to a temporary loss of service until the next reboot. CVE-2021-37735 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to execute code on the affected devices, read arbitrary files, or create a denial-of-service condition.
4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP). Successful exploitation could allow for unauthenticated remote code execution, potentially resulting in the execution of arbitrary code as a privileged user on the underlying system. CVE-2021-37726 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.2 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) command line interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37727 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) command line interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37730 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) web-based management user interface. Successful exploitation could result in the ability to execute arbitrary commands as a privileged user on the underlying OS, potentially compromising the system. CVE-2021-37732 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.5 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 An authenticated arbitrary file read access vulnerability was discovered in Aruba Instant Access Points. Successful exploitation could lead to an attacker reading any file off the underlying filesystem, including system sensitive files. CVE-2021-37734 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). 4.2.6 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A remote denial of service vulnerability was discovered in Aruba Instant through the command line interface. Successful exploitation could create a denial-of-service condition, leading to a temporary loss of service until the next reboot. CVE-2021-37735 has been assigned to this vulnerability. A CVSS v3 base score of 4.9 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) CWE-89 The affected product is vulnerable when a privileged authenticated attacker executes arbitrary commands in the local database by sending specially crafted requests to the webserver. CVE-2022-24281 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.2 DESERIALIZATION OF UNTRUSTED DATA CWE-502 The affected product allows an attacker to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges. CVE-2022-24282 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The affected product does not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low-privileged user to achieve privilege escalation. CVE-2022-25311 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to achieve privilege escalation, execute arbitrary code on the system, or execute arbitrary commands on the local database.
4.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) CWE-89 The affected product is vulnerable when a privileged authenticated attacker executes arbitrary commands in the local database by sending specially crafted requests to the webserver. CVE-2022-24281 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.2 DESERIALIZATION OF UNTRUSTED DATA CWE-502 The affected product allows an attacker to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges. CVE-2022-24282 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 4.2.3 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The affected product does not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low-privileged user to achieve privilege escalation. CVE-2022-25311 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 NULL POINTER DEREFERENCE CWE-476 Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 OUT-OF-BOUNDS WRITE CWE-787 ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party and external modules may. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-39275 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.3 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 A crafted request uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-40438 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to access or modify resources, crash the device, or achieve code execution.
4.2.1 NULL POINTER DEREFERENCE CWE-476 Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 4.2.2 OUT-OF-BOUNDS WRITE CWE-787 ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party and external modules may. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-39275 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 4.2.3 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 A crafted request uri-path can cause mod_proxy to forward the request to an origin server chosen by the remote user. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-40438 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 4.2.1 NULL POINTER DEREFERENCE CWE-476 The OPC UA ANSIC stack (also called Legacy C-stack) was reported to crash when an unexpected OPC UA response message status code was accessed via the synchronous Client API. The vulnerability was found in generated code of the OPC Foundation C-stack. An unexpected status code in response messages will result in null pointer dereference, leading to a ping-of-death crash. This affects a client, but it might also affect a server when it uses OpcUa_ClientApi_RegisterServer (e.g., register at Local Discovery Server). A specially crafted UA server or machine-in-the-middle attacker can cause the OPC UA application to crash by sending uncertain status code in response messages. CVE-2021-45117 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could crash the device by sending uncertain status code in a response message.
4.2.1 NULL POINTER DEREFERENCE CWE-476 The OPC UA ANSIC stack (also called Legacy C-stack) was reported to crash when an unexpected OPC UA response message status code was accessed via the synchronous Client API. The vulnerability was found in generated code of the OPC Foundation C-stack. An unexpected status code in response messages will result in null pointer dereference, leading to a ping-of-death crash. This affects a client, but it might also affect a server when it uses OpcUa_ClientApi_RegisterServer (e.g., register at Local Discovery Server). A specially crafted UA server or machine-in-the-middle attacker can cause the OPC UA application to crash by sending uncertain status code in response messages. CVE-2021-45117 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 USE OF CLIENT-SIDE AUTHENTICATION CWE-603 All versions of Siemens Desigo CC and Cerberus DMS use client-side authentication when neither server-side authentication nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. CVE-2022-33139 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.
3.2.1 USE OF CLIENT-SIDE AUTHENTICATION CWE-603 All versions of Siemens Desigo CC and Cerberus DMS use client-side authentication when neither server-side authentication nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. CVE-2022-33139 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets. This condition would then require a device reboot. CVE-2022-40227 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets. This condition would then require a device reboot.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets. This condition would then require a device reboot. CVE-2022-40227 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 CLASSIC BUFFER OVERFLOW CWE-120 Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, obtain control over the instruction counter, and run custom code. CVE-2022-36361 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not conduct certain validations during interaction. This could allow an unauthenticated remote attacker to manipulate the devices IP address, making the device unreachable until the device could be power cycled. CVE-2022-36362 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 IMPROPER VALIDATION OF SPECIFIED INDEX, POSITION, OR OFFSET IN INPUT CWE-1285 Affected devices do not properly validate an offset value, which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of memory content. CVE-2022-36363 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Successful exploitation of these vulnerabilities could allow an attacker to execute code remotely, put the device into a denial-of-service state, or retrieve parts of the memory.
3.2.1 CLASSIC BUFFER OVERFLOW CWE-120 Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, obtain control over the instruction counter, and run custom code. CVE-2022-36361 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not conduct certain validations during interaction. This could allow an unauthenticated remote attacker to manipulate the devices IP address, making the device unreachable until the device could be power cycled. CVE-2022-36362 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.2.3 IMPROPER VALIDATION OF SPECIFIED INDEX, POSITION, OR OFFSET IN INPUT CWE-1285 Affected devices do not properly validate an offset value, which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of memory content. CVE-2022-36363 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the FTP server. CVE-2022-38371 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Successful exploitation of these vulnerabilities could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the file transfer protocol (FTP) server.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the FTP server. CVE-2022-38371 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this to execute code in the context of the current process. CVE-2022-41851 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Successful exploitation of this vulnerability could crash the application or lead to arbitrary code execution.
3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this to execute code in the context of the current process. CVE-2022-41851 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND (OS COMMAND INJECTION) CWE-78 Siemens Desigo PXM Devices webserver is vulnerable to OS command injection. An improper neutralization of special elements used in an OS Command with root privileges during a restore operation exists; validation of file names included in the input package are missing. By restoring a specifically crafted package, a remote low-privileged attacker could execute arbitrary system commands with root privileges on the device, potentially leading to a full compromise. CVE-2022-40176 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 Siemens Desigo PXM Devices webserver is vulnerable to exposure of sensitive information to an unauthorized actor. Endpoints of the Operation web application that interpret and execute Axon language queries allow file read access to the device file system with root privileges. By supplying specific input/output (I/O) related Axon queries, a remote low-privileged attacker could read sensitive files on the device. CVE-2022-40177 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 Siemens Desigo PXM Devices webserver is vulnerable to improper neutralization of input during webpage generation in the Import Files functionality of the Operation web application, due to the missing validation of file titles included in the input package. By uploading a specifically crafted graphics package, a remote low-privileged attacker could execute arbitrary JavaScript code. CVE-2022-40178 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N). 3.2.4 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 Siemens Desigo PXM Devices webserver is vulnerable to a CSRF in endpoints of the Operation web application that interpret and execute Axon language queries, due to the missing validation of anti-CSRF tokens or other origin checks. By convincing a victim to click on a malicious link or visit a specifically crafted web page while logged-in to the device web application, a remote unauthenticated attacker could execute arbitrary Axon queries against the device. CVE-2022-40179 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). 3.2.5 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 Siemens Desigo PXM Devices webserver is vulnerable to a CSRF in the Import Files functionality of the Operation web application due to the missing validation of anti-CSRF tokens or other origin checks. By convincing a victim to visit a specially crafted web page while logged-in to the devices web application, a remote unauthenticated attacker could upload and enable permanent arbitrary JavaScript code to the device. CVE-2022-40180 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N). 3.2.6 IMPROPER NEUTRALIZATION OF ENCODED URI SCHEMES IN A WEB PAGE CWE-84 Siemens Desigo PXM Devices webserver is vulnerable to improper neutralization of encoded URL schemes in a web page. The devices embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker could perform a range of attacks against the device, such as reading arbitrary files on the filesystem, executing arbitrary JavaScript code to steal or manipulate displayed information, or triggering denial-of-service conditions CVE-2022-40181 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H). 3.2.7 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 Siemens Desigo PXM Devices webserver is vulnerable to execution with unnecessary privileges. The device launches the embedded Chromium-based browser as root with the no-sandbox option. Attackers could add arbitrary JavaScript code inside the Operation graphics and successfully exploit publicly known vulnerabilities against the version of the embedded Chromium-based browser. CVE-2022-40182 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could allow an attacker to potentially access sensitive information, execute arbitrary commands, cause a denial-of-service condition, or perform remote code execution.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND (OS COMMAND INJECTION) CWE-78 Siemens Desigo PXM Devices webserver is vulnerable to OS command injection. An improper neutralization of special elements used in an OS Command with root privileges during a restore operation exists; validation of file names included in the input package are missing. By restoring a specifically crafted package, a remote low-privileged attacker could execute arbitrary system commands with root privileges on the device, potentially leading to a full compromise. CVE-2022-40176 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 Siemens Desigo PXM Devices webserver is vulnerable to exposure of sensitive information to an unauthorized actor. Endpoints of the Operation web application that interpret and execute Axon language queries allow file read access to the device file system with root privileges. By supplying specific input/output (I/O) related Axon queries, a remote low-privileged attacker could read sensitive files on the device. CVE-2022-40177 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N). 3.2.3 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 Siemens Desigo PXM Devices webserver is vulnerable to improper neutralization of input during webpage generation in the Import Files functionality of the Operation web application, due to the missing validation of file titles included in the input package. By uploading a specifically crafted graphics package, a remote low-privileged attacker could execute arbitrary JavaScript code. CVE-2022-40178 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N). 3.2.4 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 Siemens Desigo PXM Devices webserver is vulnerable to a CSRF in endpoints of the Operation web application that interpret and execute Axon language queries, due to the missing validation of anti-CSRF tokens or other origin checks. By convincing a victim to click on a malicious link or visit a specifically crafted web page while logged-in to the device web application, a remote unauthenticated attacker could execute arbitrary Axon queries against the device. CVE-2022-40179 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). 3.2.5 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 Siemens Desigo PXM Devices webserver is vulnerable to a CSRF in the Import Files functionality of the Operation web application due to the missing validation of anti-CSRF tokens or other origin checks. By convincing a victim to visit a specially crafted web page while logged-in to the devices web application, a remote unauthenticated attacker could upload and enable permanent arbitrary JavaScript code to the device. CVE-2022-40180 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N). 3.2.6 IMPROPER NEUTRALIZATION OF ENCODED URI SCHEMES IN A WEB PAGE CWE-84 Siemens Desigo PXM Devices webserver is vulnerable to improper neutralization of encoded URL schemes in a web page. The devices embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker could perform a range of attacks against the device, such as reading arbitrary files on the filesystem, executing arbitrary JavaScript code to steal or manipulate displayed information, or triggering denial-of-service conditions CVE-2022-40181 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H). 3.2.7 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 Siemens Desigo PXM Devices webserver is vulnerable to execution with unnecessary privileges. The device launches the embedded Chromium-based browser as root with the no-sandbox option. Attackers could add arbitrary JavaScript code inside the Operation graphics and successfully exploit publicly known vulnerabilities against the version of the embedded Chromium-based browser. CVE-2022-40182 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 A vulnerability exists in the Spring Framework component included in the Prognostic Model Executor service of the affected product. An attacker could exploit this vulnerability by sending a specially crafted data or configuration to the application either directly or via integrated applications, causing the Prognostic Model Executor service to fail. CVE-2022-22950 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). 3.2.2 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 A vulnerability in the Spring Framework component included in the Prognostic Model Executor service could allow an attacker to inject arbitrary code for remote code execution. CVE-2022-22965 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
Successful exploitation of these vulnerabilities could crash the Prognostic Model Executor and could allow remote code execution.
3.2.1 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 A vulnerability exists in the Spring Framework component included in the Prognostic Model Executor service of the affected product. An attacker could exploit this vulnerability by sending a specially crafted data or configuration to the application either directly or via integrated applications, causing the Prognostic Model Executor service to fail. CVE-2022-22950 has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). 3.2.2 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 A vulnerability in the Spring Framework component included in the Prognostic Model Executor service could allow an attacker to inject arbitrary code for remote code execution. CVE-2022-22965 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Affected Siemens SIMATIC S7-1200 and S7-1500 CPU Families protect the built-in global private key with insufficient key protection. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and human machine interface (HMI) communication. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
Successful exploitation of this vulnerability could expose confidential configuration data.
3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Affected Siemens SIMATIC S7-1200 and S7-1500 CPU Families protect the built-in global private key with insufficient key protection. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and human machine interface (HMI) communication. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295 All versions of Siemens Industrial Edge Management prior to version 1.5.1 do not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entitys certificate by interfering in the communication path between the client and the intended server. CVE-2022-40147 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Successful exploitation of this vulnerability could allow an attacker to inject malicious maintenance requests by exploiting improper certification validation. An attacker could exploit this vulnerability by sending statistics, activating remote support, exchanging the initial keys when onboarding, querying new extensions, or accessing sensitive data.
3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295 All versions of Siemens Industrial Edge Management prior to version 1.5.1 do not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entitys certificate by interfering in the communication path between the client and the intended server. CVE-2022-40147 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All LOGO! 8 BM (including SIPLUS variants) versions prior to 8.3 load firmware updates without checking their authenticity; the integrity of the unencrypted firmware is only verified by a non-cryptographic method. This could allow an attacker to manipulate a firmware update and flash the modified update to the device. CVE-2022-36360 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).
Successful exploitation of this vulnerability could allow an attacker to manipulate a firmware update and flash the modified update to the device.
3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All LOGO! 8 BM (including SIPLUS variants) versions prior to 8.3 load firmware updates without checking their authenticity; the integrity of the unencrypted firmware is only verified by a non-cryptographic method. This could allow an attacker to manipulate a firmware update and flash the modified update to the device. CVE-2022-36360 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web browser" for a single vulnerability, or "Successful exploitation of these vulnerabilities could cause a denial of service, disclosure of sensitive information, communication loss, and modification of settings or ladder logic" for multiple vulnerabilities. 3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected SCALANCE v1.1.0 and RUGGEDCOM v7.1.2 products with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial-of-service condition or reboot the device, possibly affecting other network resources. CVE-2022-31766 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to render the device unusable.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected SCALANCE v1.1.0 and RUGGEDCOM v7.1.2 products with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial-of-service condition or reboot the device, possibly affecting other network resources. CVE-2022-31766 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).