Multiple vulnerabilities in Siemens SICAM GridEdge Software



Published: 2022-06-15
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2022-30228
CVE-2022-30229
CVE-2022-30230
CVE-2022-30231
CWE-ID CWE-346
CWE-306
CWE-402
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SICAM GridEdge Essential ARM
Other software / Other software solutions

SICAM GridEdge Essential Intel
Other software / Other software solutions

SICAM GridEdge Essential with GDS ARM
Other software / Other software solutions

SICAM GridEdge Essential with GDS Intel
Other software / Other software solutions

Vendor

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Origin validation error

EUVDB-ID: #VU64392

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30228

CWE-ID: CWE-346 - Origin Validation Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected software does not apply cross-origin resource sharing (CORS) restrictions for critical operations. A remote attacker can trick a victim to access a special resource and execute arbitrary request.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SICAM GridEdge Essential ARM: before 2.6.6

SICAM GridEdge Essential Intel: before 2.6.6

SICAM GridEdge Essential with GDS ARM: before 2.6.6

SICAM GridEdge Essential with GDS Intel: before 2.6.6

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing Authentication for Critical Function

EUVDB-ID: #VU64393

Risk: High

CVSSv3.1: 7.8 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30229

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the affected software does not require authenticated access for privileged functions. A remote attacker can change data of an user, such as credentials, in case that user's id is known.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SICAM GridEdge Essential ARM: before 2.6.6

SICAM GridEdge Essential Intel: before 2.6.6

SICAM GridEdge Essential with GDS ARM: before 2.6.6

SICAM GridEdge Essential with GDS Intel: before 2.6.6

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Missing Authentication for Critical Function

EUVDB-ID: #VU64395

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30230

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the affected software does not require authenticated access for privileged functions. A remote attacker can create a new user with administrative permissions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SICAM GridEdge Essential ARM: before 2.6.6

SICAM GridEdge Essential Intel: before 2.6.6

SICAM GridEdge Essential with GDS ARM: before 2.6.6

SICAM GridEdge Essential with GDS Intel: before 2.6.6

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Transmission of Private Resources into a New Sphere ('Resource Leak')

EUVDB-ID: #VU64398

Risk: Low

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30231

CWE-ID: CWE-402 - Transmission of Private Resources into a New Sphere ('Resource Leak')

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to the affected software discloses password hashes of other users upon request. A remote administrator can retrieve another users password hash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SICAM GridEdge Essential ARM: before 2.6.6

SICAM GridEdge Essential Intel: before 2.6.6

SICAM GridEdge Essential with GDS ARM: before 2.6.6

SICAM GridEdge Essential with GDS Intel: before 2.6.6

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###