CVE-2022-43513
10.01.2023, 12:15
A vulnerability has been identified in Automation License Manager V5 (All versions), Automation License Manager V6 (All versions < V6.0 SP9 Upd4), TeleControl Server Basic V3 (All versions < V3.1.2). The affected components allow to rename license files with user chosen input without authentication. This could allow an unauthenticated remote attacker to rename and move files as SYSTEM user.Enginsight
Vendor | Product | Version |
---|---|---|
siemens | automation_license_manager | 5.0.0 |
siemens | automation_license_manager | 5.1 |
siemens | automation_license_manager | 5.1:sp1 |
siemens | automation_license_manager | 5.2 |
siemens | automation_license_manager | 5.3 |
siemens | automation_license_manager | 5.3:sp3 |
siemens | automation_license_manager | 5.3.4.4 |
siemens | automation_license_manager | 6.0 |
siemens | automation_license_manager | 6.0.1 |
siemens | automation_license_manager | 6.0.8 |
siemens | automation_license_manager | 6.0.9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-73 - External Control of File Name or PathThe software allows user input to control or influence paths or file names that are used in filesystem operations.
- CWE-610 - Externally Controlled Reference to a Resource in Another SphereThe product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
References