cve-2022-29878
Vulnerability from cvelistv5
Published
2022-05-10 09:47
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
References
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf | Patch, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P850", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] }, { "product": "SICAM P855", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.00" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294: Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:47:22", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2022-29878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P850", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } }, { "product_name": "SICAM P855", "version": { "version_data": [ { "version_value": "All versions \u003c V3.00" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-294: Authentication Bypass by Capture-replay" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-29878", "datePublished": "2022-05-10T09:47:22", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:33:43.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-29878\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2022-05-20T13:15:16.177\",\"lastModified\":\"2022-06-02T14:02:36.753\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P850 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00), SICAM P855 (All versions \u003c V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3.00), SICAM P850 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3. 00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00), SICAM P855 (Todas las versiones anteriores a V3.00). Los dispositivos afectados usan un rango limitado para los desaf\u00edos que son env\u00edan durante una comunicaci\u00f3n desaf\u00edo-respuesta no cifrada. Un atacante no autenticado podr\u00eda capturar un par desaf\u00edo-respuesta v\u00e1lido generado por un usuario leg\u00edtimo, y solicitar la p\u00e1gina web repetidamente para esperar que vuelva a aparecer el mismo desaf\u00edo para el que sea conocida la respuesta correcta. Esto podr\u00eda permitir al atacante acceder a la interfaz de administraci\u00f3n del dispositivo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]},{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"29D23CC1-B5EA-4088-8552-6BD00DE6DABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19E9E75A-266E-42F4-A978-1881CFB775D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F46742A1-FEA3-46E8-A1E4-D8203F3C2CF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0B7A11-AE03-4EDD-B446-CFAE7B83A405\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"B4676DE8-BCA3-48AF-B90F-6F4331FDD77B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8F3D9-37A0-4DFD-8131-1664893C2D64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"98F64393-39B7-49DE-8F50-73E7A5DBAB61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5450BA3D-61FE-46EA-AD56-D04D3809D23D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"A5665988-B892-4C16-837A-DA5D1A1FD241\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE1C19C0-3092-4AB8-A131-3284D3CF0A00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"50A41D5D-D9CE-4436-92E1-87DFE46E703A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC17FD2-8B3B-4331-A0E2-991A0C92E119\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F555FCD5-A377-4505-9EB9-83D1FC0BA005\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAA2339-0C00-4551-958E-76E34DF50F3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"209B2BF5-0023-4F35-9E1A-5F271A026FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC103BEB-FD72-4BCF-8450-8F753986284E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"81CA2D85-1A58-42FB-BD06-F2E236808890\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB09DC-2493-4680-A718-847A9F3916C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"0D62E4F9-7230-496D-A00A-AB71EC9F56B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83646A62-58E8-47B3-A3E2-9052A223BA3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"3C748EAE-AFA9-4600-85CD-D5E1C4A2ABB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835E6B3A-D357-478D-AC74-1FB0BF1FB48B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"48DA971B-28EA-4443-B546-CE066DE5A611\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC8905ED-8C17-42A3-BB22-95F572A2CD41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"90528A32-4827-4A29-8E54-0DBCEF141183\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"513D4A78-6F4B-421F-BA56-40FF32E12692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"6BECCF69-B791-4F97-94B6-150A52A22543\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A0038B-F453-4530-A681-F37AADF797A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F8D9B433-4F5F-4C63-B16C-047186B726F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624701F6-0F97-4A83-A329-38310EA7ABAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"93845620-72CC-4C54-BF5C-9E9A9DD0439F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B81F629C-DF39-43F0-AEB9-F66CFCB29E85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"5178FF49-6E30-47D7-892F-1121288E7E8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2A92F-04A9-46BC-B334-DB06F55614A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F7E21CE9-87D8-4D20-B343-48AF64E7049D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80D60C5-AF37-4498-919E-CB6589286B3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F9DBF9D2-1C19-43F8-BFCA-1024BFC40DDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3C6DE9-9980-46E6-9468-F8167D5CF692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"8B02F4EC-85D5-442E-B71C-A9CA9C3854F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C94271C-DAD2-4C53-A701-93A542A3B154\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"4E24F48D-DC93-4126-8830-A7662AAA87CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1E983D-BE5E-4D3C-AD00-3EFB6775AE80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"63C21B33-EC43-450A-8F33-0948DD07525B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF24A81-2063-4DAB-B6E4-2546042A553C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"A402337A-B4A8-4F8D-B826-2EE714864C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15554D33-7C32-44E6-B16E-D0A5AC903E85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"F6FE0DFE-B877-4E07-9A9C-8AC24259240F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B32039-505A-4815-967B-D11F4D337CE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"1DCF2749-986F-4735-96E8-749E625CAD6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E74BAD6-218E-477C-B2C2-CE0E578A2400\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"E7558F27-235F-47B8-9D65-944BF1C92DDF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE65771-9A0E-48AF-A9FE-4705698C8997\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"AEB551BB-4C46-4FA0-B9EF-C70583D02993\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9710DFFE-974F-4A82-9E85-3311D84A951F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"D1117B8F-7911-4B2E-A9DE-5F8D3FA0DFCF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF385121-4F72-4EE3-9EC3-BC9B910E74BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"9CF9E3B9-1DC8-4293-8D2C-9B5CF6F50E23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71F882A2-DFFB-4A07-8F62-E52068EDCC35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"83A63834-D7F7-4112-9C03-AF64EA254B35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93C0DE4-4FE9-4C19-AD4A-805910DD9682\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"9C9F3057-5918-4331-863A-46A4FA292F8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"949B5448-5CCA-45A4-8D6B-8FB70EF42A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"EFFF3159-7FCF-4ACC-B06A-EB6414E01307\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"634DEE3C-5BB9-446B-A0FD-95764C0B0461\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"BC81665F-2064-4F85-88BF-5A3F46178CBE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D2956-6D5C-48C6-B0C9-868CC9DEA8D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"B302DC77-B1E2-46DF-8E6A-9F7CCBF6A899\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274D904F-D09A-4038-97FE-464BBE97A93B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"976E3302-C339-4057-A0DD-EF40A9A501F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7923FD73-F2FA-4B60-A1E3-F7C4D586269B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"3A4EF031-920F-4F69-B25A-779ACA4046B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FBA5B-E455-4E07-B39C-70AEE0C26EBF\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.