### [CVE-2022-42733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42733) ![](https://img.shields.io/static/v1?label=Product&message=syngo%20Dynamics&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path&color=brighgreen) ### Description A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper read access control that could allow files to be retrieved from any folder accessible to the account assigned to the website’s application pool. ### POC #### Reference - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697 #### Github No PoCs found on GitHub currently.