• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – ICS: Siemens Mendix Email Connector Vulnerability
December 19, 2022
Rewterz Threat Advisory – ICS: Siemens JT2Go and Teamcenter Visualization Vulnerabilities
December 19, 2022

Rewterz Threat Advisory – ICS: Siemens SICAM PAS/PQS Vulnerabilities

December 19, 2022

Severity

High

Analysis Summary

CVE-2022-43724 CVSS:8.3

Siemens SICAM PAS/PQS could allow a remote attacker to execute arbitrary commands on the system, caused by the cleartext transmission of database credentials for the inbuilt SQL server. By leveraging the credentials using the default enabled xp_cmdshell feature, an attacker could exploit this vulnerability to execute arbitrary commands on the system.

CVE-2022-43723 CVSS:7.5

Siemens SICAM PAS/PQS is vulnerable to a denial of service, caused by improper validation of user-supplied input in the s7ontcp.dll library file. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service

CVE-2022-43722 CVSS:8.3

Siemens SICAM PAS/PQS could allow a local authenticated attacker to execute arbitrary code on the system, caused by improper loading of dynamic link libraries. By placing a specially-crafted DLL file in the search path, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM level privileges on the system.

Impact

  • Command Execution
  • Denial of Service
  • Code Execution

Indicators Of Compromise

CVE

  • CVE-2022-43724
  • CVE-2022-43723
  • CVE-2022-43722

Affected Vendors

Siemens

Affected Products

  • Siemens SICAM PAS
  • Siemens SICAM PQS

Remediation

Refer to Siemens Security Advisory for patch, upgrade or suggested workaround information

Siemens Security Advisory

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.