cvelist/2022/27xxx/CVE-2022-27219.json

62 lines
2.1 KiB
JSON
Raw Normal View History

2022-03-15 16:01:47 +00:00
{
"CVE_data_meta": {
2022-06-14 11:15:11 +02:00
"ASSIGNER": "productcert@siemens.com",
2022-03-15 16:01:47 +00:00
"ID": "CVE-2022-27219",
2022-06-14 11:15:11 +02:00
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINEMA Remote Connect Server",
"version": {
"version_data": [
{
"version_value": "All versions < V3.0 SP2"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-358: Improperly Implemented Security Check for Standard"
}
]
}
]
2022-03-15 16:01:47 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-06-14 11:15:11 +02:00
"value": "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). Affected application is missing general HTTP security headers in the web server configured on port 443. This could aid attackers by making the servers more prone to clickjacking, channel downgrade attacks and other similar client-based attack vectors."
}
]
},
"references": {
"reference_data": [
{
2022-06-14 10:01:50 +00:00
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-911567.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-911567.pdf"
2022-03-15 16:01:47 +00:00
}
]
}
}