cvelist/2022/33xxx/CVE-2022-33736.json

72 lines
2.6 KiB
JSON
Raw Normal View History

2022-06-15 10:01:46 +00:00
{
"CVE_data_meta": {
2022-07-12 12:03:11 +02:00
"ASSIGNER": "productcert@siemens.com",
2022-06-15 10:01:46 +00:00
"ID": "CVE-2022-33736",
2022-07-12 12:03:11 +02:00
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Opcenter Quality V13.1",
"version": {
"version_data": [
{
"version_value": "All versions < V13.1.20220624"
}
]
}
},
{
"product_name": "Opcenter Quality V13.2",
"version": {
"version_data": [
{
"version_value": "All versions < V13.2.20220624"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-303: Incorrect Implementation of Authentication Algorithm"
}
]
}
]
2022-06-15 10:01:46 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-07-12 13:48:05 +00:00
"value": "A vulnerability has been identified in Opcenter Quality V13.1 (All versions < V13.1.20220624), Opcenter Quality V13.2 (All versions < V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials."
2022-07-12 12:03:11 +02:00
}
]
},
"references": {
"reference_data": [
{
2022-07-12 13:48:05 +00:00
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf"
2022-06-15 10:01:46 +00:00
}
]
}
}