cvelist/2022/43xxx/CVE-2022-43723.json

72 lines
2.7 KiB
JSON
Raw Normal View History

2022-10-24 13:21:10 +00:00
{
"CVE_data_meta": {
2022-12-13 17:05:36 +01:00
"ASSIGNER": "productcert@siemens.com",
2022-10-24 13:21:10 +00:00
"ID": "CVE-2022-43723",
2022-12-13 17:05:36 +01:00
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SICAM PAS/PQS",
"version": {
"version_data": [
{
"version_value": "All versions < V7.0"
}
]
}
},
{
"product_name": "SICAM PAS/PQS",
"version": {
"version_data": [
{
"version_value": "All versions >= 7.0 < V8.06"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1287: Improper Validation of Specified Type of Input"
}
]
}
]
2022-10-24 13:21:10 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-12-13 17:00:41 +00:00
"value": "A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0), SICAM PAS/PQS (All versions >= 7.0 < V8.06). Affected software does not properly validate the input for a certain parameter in the s7ontcp.dll. This could allow an unauthenticated remote attacker to send messages and create a denial of service condition as the application crashes. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions."
2022-12-13 17:05:36 +01:00
}
]
},
"references": {
"reference_data": [
{
2022-12-13 17:00:41 +00:00
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-849072.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-849072.pdf"
2022-10-24 13:21:10 +00:00
}
]
}
}