Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-30229


A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of an user, such as credentials, in case that user's id is known.


Published

2022-06-14T10:15:20.320

Last Modified

2024-11-21T07:02:24.027

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-306
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application siemens sicam_gridedge_essential < 2.6.6 Yes
Application siemens sicam_gridedge_essential < 2.6.6 Yes
Application siemens sicam_gridedge_essential < 2.6.6 Yes
Application siemens sicam_gridedge_essential < 2.6.6 Yes

References