CVE-2022-43398

A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:7kg9501-0aa01-2aa1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7kg9501-0aa01-2aa1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:7kg9501-0aa31-2aa1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7kg9501-0aa31-2aa1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:26

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf - Mitigation, Patch, Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf - Mitigation, Patch, Vendor Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf -
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.5

09 Jan 2024, 10:15

Type Values Removed Values Added
Summary A vulnerability has been identified in POWER METER SICAM Q200 family (All versions < V2.70). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session. A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.

13 Jun 2023, 09:15

Type Values Removed Values Added
References
  • (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf -
Summary A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session. A vulnerability has been identified in POWER METER SICAM Q200 family (All versions < V2.70). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.

Information

Published : 2022-11-08 11:15

Updated : 2024-11-21 07:26


NVD link : CVE-2022-43398

Mitre link : CVE-2022-43398

CVE.ORG link : CVE-2022-43398


JSON object : View

Products Affected

siemens

  • 7kg9501-0aa31-2aa1_firmware
  • 7kg9501-0aa01-2aa1_firmware
  • 7kg9501-0aa31-2aa1
  • 7kg9501-0aa01-2aa1
CWE
CWE-384

Session Fixation