Lucene search

K
nvd[email protected]NVD:CVE-2022-29876
HistoryMay 20, 2022 - 1:15 p.m.

CVE-2022-29876

2022-05-2013:15:16
CWE-79
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

31.5%

A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks.

Affected configurations

NVD
Node
siemens7kg8500-0aa00-0aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa00-0aa0Match-
Node
siemens7kg8500-0aa00-2aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa00-2aa0Match-
Node
siemens7kg8500-0aa10-0aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa10-0aa0Match-
Node
siemens7kg8500-0aa10-2aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa10-2aa0Match-
Node
siemens7kg8500-0aa30-0aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa30-0aa0Match-
Node
siemens7kg8500-0aa30-2aa0_firmwareRange<3.00
AND
siemens7kg8500-0aa30-2aa0Match-
Node
siemens7kg8501-0aa01-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa01-0aa0Match-
Node
siemens7kg8501-0aa01-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa01-2aa0Match-
Node
siemens7kg8501-0aa02-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa02-0aa0Match-
Node
siemens7kg8501-0aa02-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa02-2aa0Match-
Node
siemens7kg8501-0aa11-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa11-0aa0Match-
Node
siemens7kg8501-0aa11-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa11-2aa0Match-
Node
siemens7kg8501-0aa12-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa12-0aa0Match-
Node
siemens7kg8501-0aa12-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa12-2aa0Match-
Node
siemens7kg8501-0aa31-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa31-0aa0Match-
Node
siemens7kg8501-0aa31-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa31-2aa0Match-
Node
siemens7kg8501-0aa32-0aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa32-0aa0Match-
Node
siemens7kg8501-0aa32-2aa0_firmwareRange<3.00
AND
siemens7kg8501-0aa32-2aa0Match-
Node
siemens7kg8550-0aa00-0aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa00-0aa0Match-
Node
siemens7kg8550-0aa00-2aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa00-2aa0Match-
Node
siemens7kg8550-0aa10-0aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa10-0aa0Match-
Node
siemens7kg8550-0aa10-2aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa10-2aa0Match-
Node
siemens7kg8550-0aa30-0aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa30-0aa0Match-
Node
siemens7kg8550-0aa30-2aa0_firmwareRange<3.00
AND
siemens7kg8550-0aa30-2aa0Match-
Node
siemens7kg8551-0aa01-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa01-0aa0Match-
Node
siemens7kg8551-0aa01-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa01-2aa0Match-
Node
siemens7kg8551-0aa02-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa02-0aa0Match-
Node
siemens7kg8551-0aa02-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa02-2aa0Match-
Node
siemens7kg8551-0aa11-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa11-0aa0Match-
Node
siemens7kg8551-0aa11-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa11-2aa0Match-
Node
siemens7kg8551-0aa12-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa12-0aa0Match-
Node
siemens7kg8551-0aa12-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa12-2aa0Match-
Node
siemens7kg8551-0aa31-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa31-0aa0Match-
Node
siemens7kg8551-0aa31-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa31-2aa0Match-
Node
siemens7kg8551-0aa32-0aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa32-0aa0Match-
Node
siemens7kg8551-0aa32-2aa0_firmwareRange<3.00
AND
siemens7kg8551-0aa32-2aa0Match-

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

31.5%

Related for NVD:CVE-2022-29876