A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-849072.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-849072.pdf | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-849072.pdf - Patch, Vendor Advisory |
17 Oct 2023, 19:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sicam_pas\/pqs:*:*:*:*:*:*:*:* | |
First Time |
Siemens
Siemens sicam Pas\/pqs |
13 Oct 2023, 16:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sicam_pqs:*:*:*:*:*:*:*:* |
Information
Published : 2022-12-13 16:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43724
Mitre link : CVE-2022-43724
CVE.ORG link : CVE-2022-43724
JSON object : View
Products Affected
siemens
- sicam_pas\/pqs
CWE
CWE-319
Cleartext Transmission of Sensitive Information