Lucene search

K
nvd[email protected]NVD:CVE-2022-46144
HistoryDec 13, 2022 - 4:15 p.m.

CVE-2022-46144

2022-12-1316:15:25
CWE-664
web.nvd.nist.gov
vulnerability
scalance
authenticated attacker
cli
ssh
serial interface

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.0%

A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.

Affected configurations

NVD
Node
siemens6gk5622-2gs00-2ac2Match-
AND
siemens6gk5622-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5626-2gs00-2ac2Match-
AND
siemens6gk5626-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5632-2gs00-2ac2Match-
AND
siemens6gk5632-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5636-2gs00-2ac2Match-
AND
siemens6gk5636-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5642-2gs00-2ac2Match-
AND
siemens6gk5642-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5646-2gs00-2ac2Match-
AND
siemens6gk5646-2gs00-2ac2_firmwareRange2.33.0
Node
siemens6gk5622-2gs00-2ac2Match-
AND
siemens6gk5622-2gs00-2ac2_firmwareRange<2.3
Node
siemens6gk5626-2gs00-2ac2Match-
AND
siemens6gk5626-2gs00-2ac2_firmwareRange<2.3
Node
siemens6gk5632-2gs00-2ac2_firmwareRange<2.3
AND
siemens6gk5632-2gs00-2ac2Match-
Node
siemens6gk5636-2gs00-2ac2_firmwareRange<2.3
AND
siemens6gk5636-2gs00-2ac2Match-
Node
siemens6gk5642-2gs00-2ac2_firmwareRange<2.3
AND
siemens6gk5642-2gs00-2ac2Match-
Node
siemens6gk5646-2gs00-2ac2_firmwareRange<2.3
AND
siemens6gk5646-2gs00-2ac2Match-

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.0%

Related for NVD:CVE-2022-46144