CVE-2022-31810
https://notcve.org/view.php?id=CVE-2022-31810
A vulnerability has been identified in SiPass integrated (All versions < V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow. This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition. • https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •
CVE-2021-44524
https://notcve.org/view.php?id=CVE-2021-44524
A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal user authentication service. This could allow an unauthenticated remote attacker to trigger several actions on behalf of valid user accounts. Se ha identificado una vulnerabilidad en SiPass integrated versiones V2.76 (Todas las versiones), SiPass integrated versiones V2.80 (Todas las versiones), SiPass integrated versiones V2.85 (Todas las versiones), Siveillance Identity versiones V1.5 (Todas las versiones), Siveillance Identity versiones V1.6 (Todas las versiones anteriores a V1.6.284.0). Las aplicaciones afectadas no limitan suficientemente el acceso al servicio interno de autenticación de usuarios. • https://cert-portal.siemens.com/productcert/pdf/ssa-160202.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-463116.pdf • CWE-287: Improper Authentication CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2021-44523
https://notcve.org/view.php?id=CVE-2021-44523
A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal activity feed database. This could allow an unauthenticated remote attacker to read, modify or delete activity feed entries. Se ha identificado una vulnerabilidad en SiPass integrated versiones V2.76 (Todas las versiones), SiPass integrated versiones V2.80 (Todas las versiones), SiPass integrated versiones V2.85 (Todas las versiones), Siveillance Identity versiones V1.5 (Todas las versiones), Siveillance Identity versiones V1.6 (Todas las versiones anteriores a V1.6.284.0). Las aplicaciones afectadas no limitan suficientemente el acceso a la base de datos de alimentación de actividad interna. • https://cert-portal.siemens.com/productcert/pdf/ssa-160202.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-463116.pdf • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2021-44522
https://notcve.org/view.php?id=CVE-2021-44522
A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal message broker system. This could allow an unauthenticated remote attacker to subscribe to arbitrary message queues. Se ha identificado una vulnerabilidad en SiPass integrated versiones V2.76 (Todas las versiones), SiPass integrated versiones V2.80 (Todas las versiones), SiPass integrated versiones V2.85 (Todas las versiones), Siveillance Identity versiones V1.5 (Todas las versiones), Siveillance Identity versiones V1.6 (Todas las versiones anteriores a V1.6.284.0). Las aplicaciones afectadas no limitan suficientemente el acceso al sistema interno del corredor de mensajes. • https://cert-portal.siemens.com/productcert/pdf/ssa-160202.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-463116.pdf • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2012-5409 – SIEMENS Sipass Integrated 2.6 Ethernet Bus - Arbitrary Pointer Dereference
https://notcve.org/view.php?id=CVE-2012-5409
AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack. AscoServer.exe en el servidor en Siemens SiPass integrated MP2.6 y anteriores no trata correctamente los mensajes RPC IOCP recibidos a través de una red Ethernet, lo que permite a atacantes remotos escribir datos en cualquier posición de memoria y por lo tanto ejecutar código de su elección a través de mensajes modificados a mano, tal y como se ha demostrado por un ataque de desreferencia de un puntero de su elección o un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/22397 http://ics-cert.us-cert.gov/advisories/ICSA-12-305-01 http://ioactive.com/pdfs/SIEMENS_Sipass_Integrated_Ethernet_Bus_Arbitrary_Pointer_Dereference_V4.pdf http://secunia.com/advisories/50900 http://www.osvdb.org/86129 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-938777.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •