CVE-2022-29872
20.05.2022, 13:15
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.Enginsight
Vendor | Product | Version |
---|---|---|
siemens | 7kg8500-0aa00-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8500-0aa00-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8500-0aa10-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8500-0aa10-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8500-0aa30-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8500-0aa30-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa01-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa01-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa02-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa02-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa11-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa11-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa12-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa12-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa31-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa31-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa32-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8501-0aa32-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa00-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa00-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa10-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa10-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa30-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8550-0aa30-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa01-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa01-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa02-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa02-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa11-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa11-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa12-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa12-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa31-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa31-2aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa32-0aa0_firmware | 𝑥 < 3.00 |
siemens | 7kg8551-0aa32-2aa0_firmware | 𝑥 < 3.00 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-141 - Improper Neutralization of Parameter/Argument DelimitersThe software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as parameter or argument delimiters when they are sent to a downstream component.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.