// For flags

CVE-2022-31619

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions < V13.1.0.9), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). Java EE Server Manager HTML Adaptor in Teamcenter consists of default hardcoded credentials. Access to the application allows a user to perform a series of actions that could potentially lead to remote code execution with elevated permissions.

Se ha identificado una vulnerabilidad en Teamcenter V12.4 (Todas las versiones anteriores a V12.4.0.13), Teamcenter V13.0 (Todas las versiones anteriores a V13.0.0.9), Teamcenter V13.1 (Todas las versiones anteriores a V13.1.0.9), Teamcenter V13.2 (Todas las versiones anteriores a V13.2.0.9), Teamcenter V13.3 (Todas las versiones anteriores a V13.3.0.3), Teamcenter V14.0 (Todas las versiones anteriores a V14.0.0.2). El adaptador HTML de Java EE Server Manager en Teamcenter consta de credenciales predeterminadas codificadas. El acceso a la aplicación permite a un usuario realizar una serie de acciones que podrían llevar a la ejecución remota de código con permisos elevados

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-25 CVE Reserved
  • 2022-06-14 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-09-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 12.4 < 12.4.0.13
Search vendor "Siemens" for product "Teamcenter" and version " >= 12.4 < 12.4.0.13"
-
Affected
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 13.0 < 13.0.0.9
Search vendor "Siemens" for product "Teamcenter" and version " >= 13.0 < 13.0.0.9"
-
Affected
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 13.1 < 13.1.0.9
Search vendor "Siemens" for product "Teamcenter" and version " >= 13.1 < 13.1.0.9"
-
Affected
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 13.2 < 13.2.0.9
Search vendor "Siemens" for product "Teamcenter" and version " >= 13.2 < 13.2.0.9"
-
Affected
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 13.3 < 13.3.0.3
Search vendor "Siemens" for product "Teamcenter" and version " >= 13.3 < 13.3.0.3"
-
Affected
Siemens
Search vendor "Siemens"
Teamcenter
Search vendor "Siemens" for product "Teamcenter"
>= 14.0 < 14.0.0.2
Search vendor "Siemens" for product "Teamcenter" and version " >= 14.0 < 14.0.0.2"
-
Affected