Versio.io

CVE-2022-24040

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-05-2022 01:15
Last modified: - 20-05-2022 04:15
Total changes: - 3

Description

A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
6.5
Base score
2.8
3.6
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=siemens AND product=desigo_pxc5_firmware AND versionEndExcluding=02.20.142.10-10884
OR
vendor=siemens AND product=desigo_pxc5 AND version=-
AND
OR
vendor=siemens AND product=desigo_pxc4_firmware AND versionEndExcluding=02.20.142.10-10884
OR
vendor=siemens AND product=desigo_pxc4 AND version=-
AND
OR
vendor=siemens AND product=desigo_pxc3_firmware AND versionEndExcluding=01.21.142.4-18
OR
vendor=siemens AND product=desigo_pxc3 AND version=-
AND
OR
vendor=siemens AND product=desigo_dxr2_firmware AND versionEndExcluding=01.21.142.5-22
OR
vendor=siemens AND product=desigo_dxr2 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-24040

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.