Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2022-43724 CVSS:8.3
Siemens SICAM PAS/PQS could allow a remote attacker to execute arbitrary commands on the system, caused by the cleartext transmission of database credentials for the inbuilt SQL server. By leveraging the credentials using the default enabled xp_cmdshell feature, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVE-2022-43723 CVSS:7.5
Siemens SICAM PAS/PQS is vulnerable to a denial of service, caused by improper validation of user-supplied input in the s7ontcp.dll library file. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service
CVE-2022-43722 CVSS:8.3
Siemens SICAM PAS/PQS could allow a local authenticated attacker to execute arbitrary code on the system, caused by improper loading of dynamic link libraries. By placing a specially-crafted DLL file in the search path, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM level privileges on the system.
Siemens
Refer to Siemens Security Advisory for patch, upgrade or suggested workaround information