mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
343 lines
9.5 KiB
JSON
343 lines
9.5 KiB
JSON
{
|
|
"id": "CVE-2022-45937",
|
|
"sourceIdentifier": "productcert@siemens.com",
|
|
"published": "2022-12-13T16:15:24.893",
|
|
"lastModified": "2023-08-08T10:15:12.850",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "productcert@siemens.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "productcert@siemens.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc00-e96.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "3.5.5",
|
|
"matchCriteriaId": "36D6C5AE-A54D-40D3-8FDB-9AEC7BB67509"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc00-e96.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B2624AC-FC87-4B7E-89B0-972161B87CCC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc100-e96.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "3.5.5",
|
|
"matchCriteriaId": "084EC3F3-9BA9-49ED-B04A-743ED81BCC74"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc100-e96.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17095896-BE92-40F2-9A56-068F7809A2B8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxx-485.3_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "3.5.5",
|
|
"matchCriteriaId": "ADC7B13D-B952-43A1-B008-E9636D78A838"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxx-485.3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4978F643-D24A-49C7-B5A0-A1A7D8D7D5A8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc16.2-pe.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.8.20",
|
|
"matchCriteriaId": "7437B8B9-D3DD-4C2C-AE21-2195FE30BD77"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc16.2-pe.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBCBEA25-E09B-4FAF-A168-9141A84C711D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc24.2-pe.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.8.20",
|
|
"matchCriteriaId": "493C8A07-DBD7-40CA-B4EE-AF508FB4C67A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc24.2-pe.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CC32D0E-F2AB-4DA5-A191-05EDDF71DEB3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc24.2-pef.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.8.20",
|
|
"matchCriteriaId": "DFF0FB32-E711-4452-AD95-E101863C618F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc24.2-pef.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B36804FA-89A9-4696-B255-800FC6AF7592"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc24.2-per.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.8.20",
|
|
"matchCriteriaId": "0D247CB1-730F-44C1-AD2C-F770981A42B6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc24.2-per.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC5CD83F-1971-47BE-8144-7FD8BACD7149"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:pxc24.2-perf.a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.8.20",
|
|
"matchCriteriaId": "B3830835-7A93-4279-8FEC-1D4ABF968AC5"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:pxc24.2-perf.a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8058F06A-2C05-4109-ACB0-F41701D76648"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:talon_tc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "3.5.5",
|
|
"matchCriteriaId": "283C1476-EACB-4644-817D-979246092BBE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:talon_tc_modular_\\(bacnet\\):-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2ECD8AD9-E206-41B5-8CD4-F39DA3B4CE05"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf",
|
|
"source": "productcert@siemens.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |