7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
9.3 High
AI Score
Confidence
High
0.015 Low
EPSS
Percentile
86.8%
A vulnerability has been identified in Automation License Manager V5 (All versions), Automation License Manager V6 (All versions < V6.0 SP9 Upd4), TeleControl Server Basic V3 (All versions < V3.1.2). The affected component does not correctly validate the root path on folder related operations, allowing to modify files and folders outside the intended root directory.
This could allow an unauthenticated remote attacker to execute file operations of files outside of the specified root folder. Chained with CVE-2022-43513 this could allow Remote Code Execution.
[
{
"vendor": "Siemens",
"product": "Automation License Manager V5",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "Automation License Manager V6",
"versions": [
{
"status": "affected",
"version": "All versions < V6.0 SP9 Upd4"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "TeleControl Server Basic V3",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V3.1.2",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
9.3 High
AI Score
Confidence
High
0.015 Low
EPSS
Percentile
86.8%