Use of Client-Side Authentication in Siemens Desigo CC and Cerberus DMS



Published: 2022-10-13
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2022-33139
CWE-ID CWE-603
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cerberus DMS
Server applications / SCADA systems

Desigo CC Compact
Server applications / SCADA systems

Desigo CC
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use of Client-Side Authentication

EUVDB-ID: #VU64575

Risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-33139

CWE-ID: CWE-603 - Use of Client-Side Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected applications use client-side only authentication when neither server-side authentication nor Kerberos authentication is enabled. A remote attacker can impersonate other users or exploit the client-server protocol without being authenticated.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cerberus DMS: All versions

Desigo CC Compact: All versions

Desigo CC: All versions

External links

http://cert-portal.siemens.com/productcert/txt/ssa-836027.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###