#VU66368 Improper Neutralization of Special Elements in Output Used by a Downstream Component in Siemens products - CVE-2022-36323

 

#VU66368 Improper Neutralization of Special Elements in Output Used by a Downstream Component in Siemens products - CVE-2022-36323

Published: August 10, 2022


Vulnerability identifier: #VU66368
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-36323
CWE-ID: CWE-74
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
SCALANCE M-800 / S615
SCALANCE W-700 (IEEE 802.11ax)
SCALANCE W-700 (IEEE 802.11n)
SCALANCE W-1700 (IEEE 802.11ac)
SCALANCE XB-200
SCALANCE XC-200
SCALANCE XF-200BA
SCALANCE XM-400
SCALANCE XP-200
SCALANCE XR-300WG
SCALANCE XR-500
SCALANCE SC-600
Software vendor:
Siemens

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote administrator can inject arbitrary code or spawn a system root shell.


Remediation

Install updates from vendor's website.

External links