Versio.io

CVE-2022-24044

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 20-05-2022 03:15
Last modified: - 01-06-2022 05:28
Total changes: - 2

Description

A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The login functionality of the application does not employ any countermeasures against Password Spraying attacks or Credential Stuffing attacks. An attacker could obtain a list of valid usernames on the device by exploiting the issue and then perform a precise Password Spraying or Credential Stuffing attack in order to obtain access to at least one account.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=siemens AND product=desigo_dxr2_firmware AND versionEndExcluding=01.21.142.5-22
OR
vendor=siemens AND product=desigo_dxr2 AND version=-
AND
OR
vendor=siemens AND product=desigo_pxc3_firmware AND versionEndExcluding=01.21.142.4-18
OR
vendor=siemens AND product=desigo_pxc3 AND version=-
AND
OR
vendor=siemens AND product=desigo_pxc4_firmware AND versionEndExcluding=02.20.142.10-10884
OR
vendor=siemens AND product=desigo_pxc4 AND version=-
AND
OR
vendor=siemens AND product=desigo_pxc5_firmware AND versionEndExcluding=02.20.142.10-10884
OR
vendor=siemens AND product=desigo_pxc5 AND version=-
 

Reference

  • N/A-Vendor Advisory
 


Keywords

NVD

 

CVE-2022-24044

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.