Code Injection Vulnerability in Siemens Products
CVE-2022-36323

9.1CRITICAL

Key Information:

Summary

This vulnerability arises from improper input sanitization within certain Siemens products, which can be exploited by an authenticated attacker with administrative access. By manipulating input fields, the attacker can execute arbitrary code or obtain a system root shell, potentially compromising system integrity and security. Organizations using these devices should assess their exposure and implement mitigation strategies to safeguard against potential exploitation.

Affected Version(s)

RUGGEDCOM RM1224 LTE(4G) EU All versions < V7.1.2

RUGGEDCOM RM1224 LTE(4G) NAM All versions < V7.1.2

SCALANCE M804PB All versions < V7.1.2

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.