Vulnerabilites related to Siemens - POWER METER SICAM Q100
CVE-2022-43546 (GCVE-0-2022-43546)
Vulnerability from cvelistv5
Published
2022-11-08 00:00
Modified
2024-10-21 16:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the EndTime-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.50 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:siemens:sicam_q100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sicam_q100_firmware", "vendor": "siemens", "versions": [ { "lessThan": "2.50", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:sicam_p850_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sicam_p850_firmware", "vendor": "siemens", "versions": [ { "lessThan": "3.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:sicam_p855_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sicam_p855_firmware", "vendor": "siemens", "versions": [ { "lessThan": "3.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-43546", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:16:01.044378Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T16:08:33.311Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices do not properly validate the EndTime-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:58:41.480Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-43546", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-10-20T00:00:00", "dateUpdated": "2024-10-21T16:08:33.311Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-40752 (GCVE-0-2025-40752)
Vulnerability from cvelistv5
Published
2025-08-12 11:17
Modified
2025-08-13 20:18
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
6.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: V2.60 < V2.62 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-40752", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T13:30:23.184849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T20:18:28.424Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q200 family", "vendor": "Siemens", "versions": [ { "lessThan": "V2.80", "status": "affected", "version": "V2.70", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q200 family (All versions \u003e= V2.70 \u003c V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-12T11:17:07.776Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2025-40752", "datePublished": "2025-08-12T11:17:07.776Z", "dateReserved": "2025-04-16T08:39:30.031Z", "dateUpdated": "2025-08-13T20:18:28.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-40753 (GCVE-0-2025-40753)
Vulnerability from cvelistv5
Published
2025-08-12 11:17
Modified
2025-08-13 20:18
Severity ?
6.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
6.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices export the password for the SMTP account as plain text in the Configuration File. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: V2.60 < V2.62 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-40753", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T13:30:20.774490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T20:18:21.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "lessThan": "V2.62", "status": "affected", "version": "V2.60", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q200 family", "vendor": "Siemens", "versions": [ { "lessThan": "V2.80", "status": "affected", "version": "V2.70", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions \u003e= V2.60 \u003c V2.62), POWER METER SICAM Q200 family (All versions \u003e= V2.70 \u003c V2.80). Affected devices export the password for the SMTP account as plain text in the Configuration File. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-12T11:17:09.077Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2025-40753", "datePublished": "2025-08-12T11:17:09.077Z", "dateReserved": "2025-04-16T08:39:30.031Z", "dateUpdated": "2025-08-13T20:18:21.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44165 (GCVE-0-2021-44165)
Vulnerability from cvelistv5
Published
2021-12-14 12:06
Modified
2024-08-04 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.41 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-496292.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.41" } ] }, { "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.41" } ] }, { "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.41" } ] }, { "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.41" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-14T12:06:52", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-496292.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-44165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "POWER METER SICAM Q100", "version": { "version_data": [ { "version_value": "All versions \u003c V2.41" } ] } }, { "product_name": "POWER METER SICAM Q100", "version": { "version_data": [ { "version_value": "All versions \u003c V2.41" } ] } }, { "product_name": "POWER METER SICAM Q100", "version": { "version_data": [ { "version_value": "All versions \u003c V2.41" } ] } }, { "product_name": "POWER METER SICAM Q100", "version": { "version_data": [ { "version_value": "All versions \u003c V2.41" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41), POWER METER SICAM Q100 (All versions \u003c V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121: Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-496292.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-496292.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-44165", "datePublished": "2021-12-14T12:06:52", "dateReserved": "2021-11-23T00:00:00", "dateUpdated": "2024-08-04T04:17:24.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43545 (GCVE-0-2022-43545)
Vulnerability from cvelistv5
Published
2022-11-08 00:00
Modified
2024-08-03 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the RecordType-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.50 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices do not properly validate the RecordType-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:58:12.217Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-43545", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-10-20T00:00:00", "dateUpdated": "2024-08-03T13:32:59.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43439 (GCVE-0-2022-43439)
Vulnerability from cvelistv5
Published
2022-11-08 00:00
Modified
2024-08-03 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices do not properly validate the Language-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.50 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] }, { "defaultStatus": "unknown", "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P850 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10), SICAM P855 (All versions \u003c V3.10). Affected devices do not properly validate the Language-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:57:43.953Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-572005.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-43439", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-10-19T00:00:00", "dateUpdated": "2024-08-03T13:32:59.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-30901 (GCVE-0-2023-30901)
Vulnerability from cvelistv5
Published
2023-06-13 08:17
Modified
2025-03-05 18:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.60 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:37:15.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480095.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-30901", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-05T18:36:33.559072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-05T18:58:01.759Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:59:13.439Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480095.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-30901", "datePublished": "2023-06-13T08:17:12.290Z", "dateReserved": "2023-04-20T12:49:03.482Z", "dateUpdated": "2025-03-05T18:58:01.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43398 (GCVE-0-2022-43398)
Vulnerability from cvelistv5
Published
2022-11-08 00:00
Modified
2024-08-03 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-384 - Session Fixation
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.50 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:58.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.50" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50), POWER METER SICAM Q100 (All versions \u003c V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user\u0027s account through the activated session." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:57:13.900Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-43398", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-10-18T00:00:00", "dateUpdated": "2024-08-03T13:32:58.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31238 (GCVE-0-2023-31238)
Vulnerability from cvelistv5
Published
2023-06-13 08:17
Modified
2025-03-05 18:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). Affected devices are missing cookie protection flags when using the default settings. An attacker who gains access to a session token can use it to impersonate a legitimate application user.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | POWER METER SICAM Q100 |
Version: All versions < V2.60 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:29.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480095.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-31238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-05T18:36:30.697761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-05T18:57:56.165Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] }, { "defaultStatus": "unknown", "product": "POWER METER SICAM Q100", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.60" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60), POWER METER SICAM Q100 (All versions \u003c V2.60). Affected devices are missing cookie protection flags when using the default settings. An attacker who gains access to a session token can use it to impersonate a legitimate application user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T09:59:42.265Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480095.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-31238", "datePublished": "2023-06-13T08:17:13.351Z", "dateReserved": "2023-04-26T17:03:00.579Z", "dateUpdated": "2025-03-05T18:57:56.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }