// For flags

CVE-2022-44731

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances.

This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker's credentials or start a Ctrl script).

Se ha identificado una vulnerabilidad en:
SIMATIC WinCC OA V3.15 (todas las versiones &lt; V3.15 P038),
SIMATIC WinCC OA V3.16 (todas las versiones &lt; V3.16 P035),
SIMATIC WinCC OA V3.17 (todas las versiones &lt; ; V3.17 P024),
SIMATIC WinCC OA V3.18 (Todas las versiones &lt; V3.18 P014).
El componente afectado permite inyectar argumentos personalizados a la aplicación backend de Ultralight Client en determinadas circunstancias. Esto podría permitir a un atacante remoto autenticado inyectar parámetros arbitrarios al iniciar el cliente a través de la interfaz web (por ejemplo, abrir paneles elegidos por el atacante con las credenciales del atacante o iniciar un script Ctrl).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-11-04 CVE Reserved
  • 2022-12-13 CVE Published
  • 2024-07-05 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Simatic Wincc Oa
Search vendor "Siemens" for product "Simatic Wincc Oa"
3.15
Search vendor "Siemens" for product "Simatic Wincc Oa" and version "3.15"
-
Affected
Siemens
Search vendor "Siemens"
Simatic Wincc Oa
Search vendor "Siemens" for product "Simatic Wincc Oa"
3.16
Search vendor "Siemens" for product "Simatic Wincc Oa" and version "3.16"
-
Affected
Siemens
Search vendor "Siemens"
Simatic Wincc Oa
Search vendor "Siemens" for product "Simatic Wincc Oa"
3.17
Search vendor "Siemens" for product "Simatic Wincc Oa" and version "3.17"
-
Affected
Siemens
Search vendor "Siemens"
Simatic Wincc Oa
Search vendor "Siemens" for product "Simatic Wincc Oa"
3.18
Search vendor "Siemens" for product "Simatic Wincc Oa" and version "3.18"
-
Affected