source-url
stringlengths
62
64
Prompt
stringlengths
762
25.3k
Correct Answer
stringlengths
74
7.83k
vulnerability-overview
stringlengths
186
24.7k
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution.
4.2.1 USE OF UNMAINTAINED THIRD-PARTY COMPONENTS CWE-1104 GNU/Linux vulnerabilities have been identified. For a full list of the identified vulnerabilities, please see Siemens SSB-439005
https://www.cisa.gov/news-events/ics-advisories/icsa-20-161-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges.
4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 --------- Begin Update K Part 2 of 2 --------- The affected product is vulnerable due to a common component of the affected applications that regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local unauthorized user...
https://www.cisa.gov/news-events/ics-advisories/icsa-20-105-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could create a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION (RESOURCE EXHAUSTION) CWE-400 The InterNiche-based TCP stack can be forced to make resource intense calls for every incoming packet, which can lead to a denial-of-service condition. CVE-2019-19300 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calcu...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an authorized threat actor to obtain privileges to access passwords.
4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. CVE-2021-37...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities may allow an authenticated user to enable escalation of privilege via local access.
4.2.1 IMPROPER INPUT VALIDATION CWE-20 Improper input validation in BIOS firmware for some Intel processors may allow an authenticated user to potentially enable escalation of privilege via local access. CVE-2020-0590 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vec...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-222-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, privilege escalation, and configuration change.
4.2.1 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A race condition in the firmware for some Intel processors may allow a privileged user to enable escalation of privilege via local access. CVE-2020-8670 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial-of-service condition for TCP services ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could cause a denial-of-service condition on the service or the device.
4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In OPC Foundation Local Discovery Server versions before 1.04.402.463, remote attackers can cause a denial-of-service condition by sending targeted messages that lead to access of a memory location after the end of a buffer. CVE-2021-...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.
4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 An attacker can trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters, which could result in a denial-of-service condition. Learn more about this vulnerability here. CVE-2022-0778 has been assigned to this vulne...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could result in a denial-of-service condition, hijacking of web sessions, and the loss of confidential or sensitive information.
3.2.1 IMPROPER NEUTRALIZATION OF SCRIPT-RELATED HTML TAGS IN A WEB PAGE (BASIC XSS) CWE-80 The integrated web server could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link, which an attacker could use to trigger a malicious request on the affected device. CVE-20...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities would allow an attacker to execute arbitrary code with elevated privileges or retrieve user credentials and other sensitive information.
3.2.1 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 By injecting code into specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges on affected Siemens RUGGEDCOM and SCALANCE devices. CVE-2022-34821 has been assigned to this vulnerability. A CVSS v...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-346-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to execute code after tricking users into accessing malicious links.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious li...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges.
3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected application improperly assigns file permissions to installation folders. This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges. CVE-2022-43517...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to perform host header injection attacks.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74 The affected application contains a host header injection vulnerability that could allow an attacker to spoof host header information and redirect users to malicious websites. CVE-2022-46265 has been assigned...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow for a denial of service or remote code execution.
3.2.1 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 An attacker could craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial-of-service condition) or potential remote code execution. In a TL...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to hijack existing sessions or spoof future sessions.
3.2.1 PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342 Initial sequence numbers (ISNs) for TCP connections are derived from an insufficiently random source; the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future sessions. CVE-2020-28388 has bee...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial-of-service condition on ports 443/TCP and 4443/TCP for a duration. CVE-2022-45044 has been assigned to this v...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow attackers to cause a denial-of-service condition on affected SIPROTEC 5 devices.
3.2.1 RESOURCE MANAGEMENT ERRORS CWE-399 The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products could allow remote attackers to cause a denial-of-service condition (CPU consumption) via a specially crafted packet. CVE-2015-6574 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could lead the application to crash or lead to arbitrary code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. CVE-2022-3159 has been assigned to this vulnerability. A CVS...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a low privilege authenticated attacker to gain high privilege access.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens APOGGEE PXC Series versions prior to 3.5.5, APOGEE PXC Series versions prior to 2.8.20, and TALON TC Series versions prior to 3.5.5 are vulnerable to an Improper Access Control vulnerability, which could allow a low privilege authenticated attacker with network access to th...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-17
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an authenticated remote attacker to read and manipulate sensitive information.
3.2.1IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Email Connector versions prior to 2.0.0 improperly handle access control for some module entities, which could allow an authenticated remote attacker to read and manipulate sensitive information. CVE-2022-45936 has been assigned to this vulnerability. A CVSS v3 base s...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-18
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a denial-of-service condition, corrupt memory, or potentially execute custom code.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 Siemens SCALANCE SC-600 Family versions prior to 3.0; the zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has a plethora of distant matches. CVE-2022-25032 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been ass...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-19
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could lead to remote code execution, privilege escalation, or the creation of a denial-of-service condition.
3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 Affected software does not properly secure a folder containing library files. This could allow an attacker to place a custom malicious .dll in this folder, which is then run with SYSTEM rights when users start a service that requires this .dll. At the time of assigning the...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-20
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities by tricking a user into opening a malicious file with the affected products could lead the application to crash or lead to arbitrary code execution.
3.2.1 NULL POINTER DEREFERENCE CWE-476 The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application, causing denial of service condition. CVE-2022-41278 has been assigned to this vulnerability....
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attack to take over another users session after login, cause a denial-of-service condition, or control the program counter which could result in arbitrary code execution.
4.2.1 SESSION FIXATION CWE-384 Affected SICAM P850 and P855 devices versions prior to 3.10 accept user defined session cookies and do not renew the session cookie after login or logout. This could allow an attacker to take over another users session after login. --------- Begin Update A part 1 of 2 --------- CVE-2022-4...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-258-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow remote attackers to gain unauthenticated access to the application.
4.2.1 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 Affected versions of the module provide insufficient protection from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and access the application. CVE-2022-37011 has been assigned to this vulnerability. A CVSS v3 base sco...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a remote attacker to generate a denial-of-service condition on devices running the affected software.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 --------- Begin Update A Part 2 of 4 --------- The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vul...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-09
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the current process.
4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected application is vulnerable to fixed-length heap-based buffer while parsing specially crafted TIF files. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE-2022-39136 has been assigned to this vulnerability. A CVSS...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected applications contain an out-of-bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. CVE-2022-46345 has been assigned to this vulnerability. A CVSS ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow authenticated remote attackers to read or delete sensitive information.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 Siemens Mendix Workflow Commons versions prior to v2.4.0 of the module improperly handle access control for some module entities, which could allow authenticated remote attackers to read or delete sensitive information. CVE-2022-46664 has been assigned to this vulnerability. A CVSS...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could result in a remote attacker causing a denial-of-service condition on the affected devices.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not correctly process certain specially crafted packets sent to port 102/TCP, which could allow an attacker to cause a denial-of-service condition on the device. CVE-2021-40365 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calcul...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to track the activity of other users.
4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack. CVE-2022-30694 has been assigned to this vul...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an authenticated remote attacker to inject arbitrary parameters when starting the Ultralight Client via the web interface.
3.2.1 IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') CWE-88 The affected component allows injection of custom arguments into the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when st...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-11
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow low privileged attackers to escalate privileges.
4.2.1 MISSING AUTHORIZATION CWE-862 Affected Siemens SCALANCE and RUGGEDCOM devices of versions prior to V7.1.2 do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. CVE-2022-31765 has been assigned to this vulnerability. A CVSS ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to write arbitrary files.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A crafted PKGX file could force ICONICS Workbench to write an arbitrary file through path traversal. CVE-2022-40264 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string i...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could result in unauthenticated remote code execution, unauthenticated password changes, and escalation of privileges.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Schneider Electric APC Easy UPS Online versions 2.5-GA and prior are missing authentication for the updatePassword endpoint implemented in the LoginAction.updatePassword method. An unauthenticated user could exploit this vulnerability to modify administrator pa...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-342-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to acquire credentials.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 Advantech iView versions 5.7.04.6469 and prior are vulnerable to a SQL injection that could disclose sensitive product information to an unauthorized user. CVE-2022-3323 has been assigned to this vulnerability. A CVSS v3 b...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-342-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an unauthorized user to cause denial-of-service condition on a targeted device.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device bec...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-335-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to obtain credentials to the affected device and obtain complete control.
3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The Config-files of Horner Automations RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-335-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to cause a denial-of-service condition on a target product by sending specially crafted packets.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 MELSEC iQ-R Series RJ71EN71 products with firmware versions prior to 65 and R04/08/16/32/120ENCPU products with Network firmware versions prior to 65 are vulnerable to improper input validation. A remote unauthenticated user could cause a denial-of-service condition on a target pr...
https://www.cisa.gov/news-events/ics-advisories/icsa-19-346-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to pose as an authorized user to obtain the status information of the PLC.
4.2.1 AUTHENTICATION BYPASS BY SPOOFING CWE-290 An attacker could spoof arbitrary messages or execute commands. CVE-2019-18259 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L). 4.2.2 AUTHENTICATION BYPASS BY CAPTUR...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-334-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow a remote attacker to cause a denial-of-service condition. Recovery requires a system reset.
3.2.1UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The product does not properly control the allocation and maintenance of a limited resource, and could thereby enable an actor to influence resource consumption, eventually leading to the exhaustion of available resources. CVE-2021-20609has been assigned to this vulnerabili...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition by sending a specially crafted command.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected GOT2000 Series devices with FTP server versions 01.39.000 and prior are vulnerable to improper input validation, which could allow an attacker to cause a denial-of-service condition by sending a specially crafted command. CVE-2022-40266 has been assigned to this vulne...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to obtain sensitive credentials and gain access to the affected products, perform unauthorized modifications, or provoke a denial-of-service condition.
3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energys PCM600 products in which IED credentials are stored in cleartext inside the PCM600 database. An unauthorized user who ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an unauthorized user to execute administrator level scripts.
3.2.1IMPROPER USE OF VALIDATION FRAMEWORK CWE-1173 An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user could launch an administrator level remote code execution regardless of the authenticated user's role. CVE-2022-3388has been assigned ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker with physical access to take full control of the device using the console port.
4.2.1 IMPROPER PHYSICAL ACCESS CONTROL CWE-1263 An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow unauthorized users to gain access to the MELSEC iQ-R/F/L series CPU modules and the MELSEC iQ-R series OPC UA server module or to view and execute programs or view project files without permissions.
4.2.1CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could gain access to the CPU module and the OPC UA server module. CVE-2022-25164 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has ...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities may cause a denial-of-service condition.
4.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 A malicious attacker may cause a denial-of-service condition by spoofing MELSEC, GOT, or FREQROL, and returning crafted reply packets. CVE-2021-20587 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR...
https://www.cisa.gov/news-events/ics-advisories/icsa-20-212-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability may allow an attacker to obtain unauthorized information, modify information, and cause a denial-of-service condition.
4.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition. CVE-2020-14521 ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could crash the device being accessed or allow arbitrary code execution.
3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. CVE-2022-3084 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to insert malicious DLL files and trick the application into executing code.
3.2.1 UNCONTROLLED SEARCH PATH ELEMENT CWE-427 In AVEVA Edge versions R2020 and prior could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking the AVEVA Edge InstallShield package to load an unsafe DLL. This attack is only possible during the...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could lead to a heap buffer overflow, release of unallocated memory, or a read access violation.
3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 In Phoenix Contact Automation Worx Software Suite up to version 1.89, manipulated PC Worx or Config+ files could lead to a heap buffer overflow or a read access violation. Availability, integrity, or confidentiality of an application ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities might result in false alerts being issued to broadcast or cable sites that are immediately connected to the compromised system.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Digital Alert Systems DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability where remote attackers could inject arbitrary web script or HTML code via the username field of the login page ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could provide an attacker with root privileges and total control of the system.
3.2.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 The affected devices and versions of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges. CVE-2022-3088 has been assigned to this vulnerability. A CVSS...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-321-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to obtain user credential hashes.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific p...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-321-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to execute code and native system commands.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and priorare vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to ex...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-319-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to execute malicious OS commands.
3.2.1 OS COMMAND INJECTION CWE-78 A malicious OS command execution vulnerability in OpenSSL affects Mitsubishi Electric GT SoftGOT2000. If an attacker sends a specially crafted certificate, then this vulnerability could allow an attacker to execute malicious OS commands. CVE-2022-2068 has been assigned to this vulnerab...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-350-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow access to unencrypted data.
4.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 The affected product is vulnerable to insufficiently protected keys required for decrypting intellectual property data, which could allow an attacker to discover the keys and bypass the protection intended by IEEE 1735 standard. CVE-2021-42023 has been assigned to this...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-350-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could be leveraged by an attacker to initiate a crash, information leak, denial-of-service conditions, or remote code execution.
4.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-228-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to decrypt credentials and gain full access to the affected programmable logic controller (PLC).
4.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 --------- Begin Update A part 2 of 3 --------- Passwords are not adequately encrypted during the communication process between the affected versions of LS ELECTRIC's XG5000 software and the affected LS ELECTRIC PLCs. This could allow an attacker to identify and decrypt the a...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-15
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to steal session cookies and hijack a session.
4.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (CROSS-SITE SCRIPTING) CWE-79 In affected versions of Siemens SCALANCE X-200 and X-200IRT device families, an attacker could steal session cookies and hijack user sessions by using a cross-site scripting vulnerability. --------- Begin Update A part 2 of ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-258-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could occupy all available HTTP connections and cause a denial-of-service condition.
4.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assigned to this vulnerabilit...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to inject arbitrary code to retrieve and modify database contents and execute system commands.
4.2.1IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutShift API. CVE-2022-41701has been assigned to this vulnerability. A CVSS v3 base sc...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow attackers with write access to the logback configuration file to execute arbitrary code on the system.
3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 In Siemens SINEC NMS logback version 1.2.7 and prior, an attacker with the required privileges to edit configuration files could craft malicious packages allowing the execution arbitrary code loaded from LDAP servers. CVE-2021-42550 has been assigned to this vulnerability...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow attackers to discover the private key of a given CPU product family via an offline attack against a single CPU from the family. Attackers could then use this knowledge to extract confidential configuration data from projects.
3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 All versions of Siemens SINUMERIK ONE and SINUMERIK MC use an insecure method to store authentication credentials, which are therefore susceptible to being retrieved. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculate...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could cause a denial-of-service condition where the affected web servers wait for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 Affected Siemens RUGGEDCOM ROS devices improperly handle partial HTTP requests, which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial-of-service condition that persists until the attack ends. CVE-2022-39158 has been assign...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to read credentials and impersonate authorized users.
3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 All versions of Siemens QMS Automotive contain a vulnerability that stores user credentials in plaintext inside the user database. This could allow an attacker to read credentials from memory. CVE-2022-43958 has been assigned to this vulnerability. A CV...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to inject commands or exploit buffer overflow vulnerabilities, which could lead to denial of service, unauthenticated remote code execution. or stored XSS.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers (not actual public keys) and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client requires few CPU resou...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3.2.1 OUT-OF-BOUNDS READ CWE-125 Siemens Parasolid contains an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-39157 has been assigned to this vulnerability. A CVSS v3 base s...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information and compromise the vulnerable device and other connected machines.
4.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priors web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. --------- Begin Update A Pa...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to place malicious code on the target device.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The software uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within th...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could result in the execution of a malicious kernel, running of arbitrary malicious programs, or running of modified Nokia programs.
3.2.1 IMPROPER ACCESS CONTROL FOR VOLATILE MEMORY CONTAINING BOOT CODE CWE-1274 A vulnerability exists in Nokias ASIK AirScale system module (versions 474021A.101 and 474021A.102) that could allow an attacker to place a script on the file system accessible from Linux. A script placed in the appropriate place could allo...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could create a denial-of-service condition or enable arbitrary code execution.
4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could result in a denial-of-service condition causing the server to be unavailable.
3.2.1 IMPROPER ACCESS CONTROL CWE-284 An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and Events service could open a connection, causing the service to fault and become unavailable. The affected port could be used as a server ping port and uses messages structured wi...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to trick users into clicking on malicious links and steal sensitive information.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 SAUTER Controls moduWeb firmware version 2.7.1 is vulnerable to reflective cross-site scripting (XSS). The web application does not adequately sanitize request strings of malicious JavaScript. An attacker utilizing XSS cou...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could lead to a denial-of-service condition and allow remote code execution.
3.2.1INCORRECT AUTHORIZATION CWE-863 The administrator graphical user interface (GUI) lacks correct handling of RBAC, which may allow a malicious user to send modified HTTP requests to the targeted device. If exploited, a read-only remote attacker could potentially execute commands or configuration changes as the admin...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-300-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could cause a denial-of-service condition in the affected product.
3.2.1IMPROPER INPUT VALIDATION CWE-20 A specifically malformed HTTP request could cause the affected VTScada to crash. Both local area network (LAN)-only and internet facing systems are affected. CVE-2022-3181 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector stri...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerabilities could allow an attacker to gain unauthorized access to information.
3.2.1RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 A vulnerability exists when Hitachi Energy MicroSCADA X DMS600 v4.5 uses an affected version of PostgreSQL. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. Successful ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected product, all CKS CEVAS versions prior to 1.01.46, is vulnerable to cross-site scripting; this could allow an attacker to retrieve data with specially crafted SQL queries. CVE-2021-36206 has been assigned to th...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to access the application without a valid account.
3.2.1 WEAK AUTHENTICATION CWE-1390 Siemens Siveillance Video Mobile Server versions prior to V22.2a(80) contain an authentication bypass vulnerability that could allow an unauthenticated remote attacker to access the application without a valid account. CVE-2022-43400 has been assigned to this vulnerability. A CVSS v3 ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an unauthorized attacker to cause denial-of-service of the production line, damage the tools used in the production line, introduce defects in pieces of the production line, and perform remote code execution.
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Authentication is currently unsupported in Haas Controller version 100.20.000.1110 when using the Ethernet Q Commands service, which allows any user on the same network segment as the controller (even while connected remotely) to access the service and write un...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could cause a loss of sensitive data, manipulation of information, and denial-of-service.
3.2.1 IMPROPER AUTHENTICATION CWE-287 The HEIDENHAIN Controller TNC 640, version 340590 07 SP5, running HEROS 5.08.3 controlling the HARTFORD 5A-65E CNC machine is vulnerable to improper authentication, which may allow an attacker to deny service to the production line, steal sensitive data from the production line, an...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-293-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities may crash the device being accessed or allow remote arbitrary code execution.
3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. CVE-2022-40201 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the C...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-291-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could result in an unauthorized attacker remotely deleting files on the system or allowing remote code execution.
3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files. CVE-2022-3387 has been assigned to this vulnerabili...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-287-07
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to inject commands or trigger buffer overflows.
4.2.1 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 The web interface for RAPConsole lacks Anti-CSRF protections in place for state-changing operations. This can be exploited by an attacker to reboot the affected device if the attacker can convince a user to visit a specially crafted webpage. CVE-2019-5318 has been assigne...
https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to execute code on the affected devices, read arbitrary files, or create a denial-of-service condition.
4.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP). Successful exploitation could allow for unauthenticated remote code execution, potentially resulting in the execution of arbitrary code as a privileged ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-03
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to achieve privilege escalation, execute arbitrary code on the system, or execute arbitrary commands on the local database.
4.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) CWE-89 The affected product is vulnerable when a privileged authenticated attacker executes arbitrary commands in the local database by sending specially crafted requests to the webserver. CVE-2022-24281 has been assigned to this v...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to access or modify resources, crash the device, or achieve code execution.
4.2.1 NULL POINTER DEREFERENCE CWE-476 Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server v2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could crash the device by sending uncertain status code in a response message.
4.2.1 NULL POINTER DEREFERENCE CWE-476 The OPC UA ANSIC stack (also called Legacy C-stack) was reported to crash when an unexpected OPC UA response message status code was accessed via the synchronous Client API. The vulnerability was found in generated code of the OPC Foundation C-stack. An unexpected status code in r...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-16
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated.
3.2.1 USE OF CLIENT-SIDE AUTHENTICATION CWE-603 All versions of Siemens Desigo CC and Cerberus DMS use client-side authentication when neither server-side authentication nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without b...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-14
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets. This condition would then require a device reboot.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial-of-service condition by sending specially crafted TCP packets. This condition would then require a device reboot. CVE-...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-13
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to execute code remotely, put the device into a denial-of-service state, or retrieve parts of the memory.
3.2.1 CLASSIC BUFFER OVERFLOW CWE-120 Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, obtain control over the instruction counter, and run custom code. CVE-2022-36361 has been assigned to this vulnerability. A CVSS v3 bas...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-12
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the file transfer protocol (FTP) server.
3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The FTP server does not properly release memory resources reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial-of-service condition on devices incorporating a vulnerable version of the FTP server. CVE-2022-383...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-10
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could crash the application or lead to arbitrary code execution.
3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this to execute code in the context of the current process. CVE-2022-41851 has been assigned to this vulnerability. A CVSS...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-06
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could allow an attacker to potentially access sensitive information, execute arbitrary commands, cause a denial-of-service condition, or perform remote code execution.
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND (OS COMMAND INJECTION) CWE-78 Siemens Desigo PXM Devices webserver is vulnerable to OS command injection. An improper neutralization of special elements used in an OS Command with root privileges during a restore operation exists; validation of fil...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-05
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of these vulnerabilities could crash the Prognostic Model Executor and could allow remote code execution.
3.2.1 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 A vulnerability exists in the Spring Framework component included in the Prognostic Model Executor service of the affected product. An attacker could exploit this vulnerability by sending a specially crafted data or configuration to the application eit...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-04
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could expose confidential configuration data.
3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Affected Siemens SIMATIC S7-1200 and S7-1500 CPU Families protect the built-in global private key with insufficient key protection. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. A...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-02
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to inject malicious maintenance requests by exploiting improper certification validation. An attacker could exploit this vulnerability by sending statistics, activating remote support, exchanging the initial keys when onboarding, querying new extensi...
3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295 All versions of Siemens Industrial Edge Management prior to version 1.5.1 do not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entitys certificate by interfering in the communication path between t...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-01
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an attacker to manipulate a firmware update and flash the modified update to the device.
3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 All LOGO! 8 BM (including SIPLUS variants) versions prior to 8.3 load firmware updates without checking their authenticity; the integrity of the unencrypted firmware is only verified by a non-cryptographic method. This could allow an attacker to manipulate a ...
https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-08
You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b...
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to render the device unusable.
3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected SCALANCE v1.1.0 and RUGGEDCOM v7.1.2 products with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial-of-service condition or reboot the device, possibly affecting other network resourc...