Lucene search

K
nvd[email protected]NVD:CVE-2022-44731
HistoryDec 13, 2022 - 4:15 p.m.

CVE-2022-44731

2022-12-1316:15:24
CWE-88
web.nvd.nist.gov
5
simatic wincc oa
vulnerability
injection
ultralight client
remote attacker

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

35.5%

A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances.

This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker’s credentials or start a Ctrl script).

Affected configurations

Nvd
Node
siemenssimatic_wincc_oaMatch3.15
OR
siemenssimatic_wincc_oaMatch3.16-
OR
siemenssimatic_wincc_oaMatch3.17-
OR
siemenssimatic_wincc_oaMatch3.18-
VendorProductVersionCPE
siemenssimatic_wincc_oa3.15cpe:2.3:a:siemens:simatic_wincc_oa:3.15:*:*:*:*:*:*:*
siemenssimatic_wincc_oa3.16cpe:2.3:a:siemens:simatic_wincc_oa:3.16:-:*:*:*:*:*:*
siemenssimatic_wincc_oa3.17cpe:2.3:a:siemens:simatic_wincc_oa:3.17:-:*:*:*:*:*:*
siemenssimatic_wincc_oa3.18cpe:2.3:a:siemens:simatic_wincc_oa:3.18:-:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

35.5%

Related for NVD:CVE-2022-44731