A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system ("backdoors") or cause a denial of service.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf - Patch, Vendor Advisory |
Information
Published : 2022-01-11 12:15
Updated : 2024-11-21 06:32
NVD link : CVE-2021-45460
Mitre link : CVE-2021-45460
CVE.ORG link : CVE-2021-45460
JSON object : View
Products Affected
siemens
- sicam_pq_analyzer
- sicam_pq_analyzer_firmware
CWE
CWE-428
Unquoted Search Path or Element