CVE-2022-41665

A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the parameter of a specific GET request. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
siemensCNA
9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
siemens7kg8500-0aa00-0aa0_firmware
𝑥
< 3.10
siemens7kg8500-0aa00-2aa0_firmware
𝑥
< 3.10
siemens7kg8500-0aa10-0aa0_firmware
𝑥
< 3.10
siemens7kg8500-0aa10-2aa0_firmware
𝑥
< 3.10
siemens7kg8500-0aa30-0aa0_firmware
𝑥
< 3.10
siemens7kg8500-0aa30-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa01-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa01-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa02-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa02-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa11-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa11-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa12-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa12-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa31-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa31-2aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa32-0aa0_firmware
𝑥
< 3.10
siemens7kg8501-0aa32-2aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa00-0aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa00-2aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa10-0aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa10-2aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa30-0aa0_firmware
𝑥
< 3.10
siemens7kg8550-0aa30-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa01-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa01-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa02-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa02-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa11-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa11-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa12-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa12-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa31-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa31-2aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa32-0aa0_firmware
𝑥
< 3.10
siemens7kg8551-0aa32-2aa0_firmware
𝑥
< 3.10
𝑥
= Vulnerable software versions