cvelist/2022/33xxx/CVE-2022-33736.json
2022-07-12 13:48:05 +00:00

72 lines
2.6 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-33736",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Opcenter Quality V13.1",
"version": {
"version_data": [
{
"version_value": "All versions < V13.1.20220624"
}
]
}
},
{
"product_name": "Opcenter Quality V13.2",
"version": {
"version_data": [
{
"version_value": "All versions < V13.2.20220624"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-303: Incorrect Implementation of Authentication Algorithm"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Opcenter Quality V13.1 (All versions < V13.1.20220624), Opcenter Quality V13.2 (All versions < V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf"
}
]
}
}