Lucene search

K
cveSiemensCVE-2023-30899
HistoryMay 09, 2023 - 1:15 p.m.

CVE-2023-30899

2023-05-0913:15:18
CWE-502
siemens
web.nvd.nist.gov
20
cve-2023-30899
siveillance video
remote code execution
vulnerability
nvd
management server
deserialization

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

8.5

Confidence

High

EPSS

0.002

Percentile

55.6%

A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Management Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system.

Affected configurations

Nvd
Node
siemenssiveillance_videoMatch2020r2
OR
siemenssiveillance_videoMatch2020r3
OR
siemenssiveillance_videoMatch2021r1
OR
siemenssiveillance_videoMatch2021r2
OR
siemenssiveillance_videoMatch2022r1
OR
siemenssiveillance_videoMatch2022r2
OR
siemenssiveillance_videoMatch2022r3
OR
siemenssiveillance_videoMatch2023r1
VendorProductVersionCPE
siemenssiveillance_video2020cpe:2.3:a:siemens:siveillance_video:2020:r2:*:*:*:*:*:*
siemenssiveillance_video2020cpe:2.3:a:siemens:siveillance_video:2020:r3:*:*:*:*:*:*
siemenssiveillance_video2021cpe:2.3:a:siemens:siveillance_video:2021:r1:*:*:*:*:*:*
siemenssiveillance_video2021cpe:2.3:a:siemens:siveillance_video:2021:r2:*:*:*:*:*:*
siemenssiveillance_video2022cpe:2.3:a:siemens:siveillance_video:2022:r1:*:*:*:*:*:*
siemenssiveillance_video2022cpe:2.3:a:siemens:siveillance_video:2022:r2:*:*:*:*:*:*
siemenssiveillance_video2022cpe:2.3:a:siemens:siveillance_video:2022:r3:*:*:*:*:*:*
siemenssiveillance_video2023cpe:2.3:a:siemens:siveillance_video:2023:r1:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2020 R2",
    "versions": [
      {
        "version": "All versions < V20.2 HotfixRev14",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2020 R3",
    "versions": [
      {
        "version": "All versions < V20.3 HotfixRev12",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2021 R1",
    "versions": [
      {
        "version": "All versions < V21.1 HotfixRev12",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2021 R2",
    "versions": [
      {
        "version": "All versions < V21.2 HotfixRev8",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R1",
    "versions": [
      {
        "version": "All versions < V22.1 HotfixRev7",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R2",
    "versions": [
      {
        "version": "All versions < V22.2 HotfixRev5",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R3",
    "versions": [
      {
        "version": "All versions < V22.3 HotfixRev2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2023 R1",
    "versions": [
      {
        "version": "All versions < V23.1 HotfixRev1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

8.5

Confidence

High

EPSS

0.002

Percentile

55.6%

Related for CVE-2023-30899