A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of an user, such as credentials, in case that user's id is known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf - Patch, Vendor Advisory |
Information
Published : 2022-06-14 10:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30229
Mitre link : CVE-2022-30229
CVE.ORG link : CVE-2022-30229
JSON object : View
Products Affected
siemens
- sicam_gridedge_essential