Rewterz Threat Advisory – ICS: Siemens Mendix Email Connector Vulnerability
December 19, 2022Rewterz Threat Advisory – ICS: Siemens JT2Go and Teamcenter Visualization Vulnerabilities
December 19, 2022Rewterz Threat Advisory – ICS: Siemens Mendix Email Connector Vulnerability
December 19, 2022Rewterz Threat Advisory – ICS: Siemens JT2Go and Teamcenter Visualization Vulnerabilities
December 19, 2022Severity
High
Analysis Summary
CVE-2022-43724 CVSS:8.3
Siemens SICAM PAS/PQS could allow a remote attacker to execute arbitrary commands on the system, caused by the cleartext transmission of database credentials for the inbuilt SQL server. By leveraging the credentials using the default enabled xp_cmdshell feature, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVE-2022-43723 CVSS:7.5
Siemens SICAM PAS/PQS is vulnerable to a denial of service, caused by improper validation of user-supplied input in the s7ontcp.dll library file. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service
CVE-2022-43722 CVSS:8.3
Siemens SICAM PAS/PQS could allow a local authenticated attacker to execute arbitrary code on the system, caused by improper loading of dynamic link libraries. By placing a specially-crafted DLL file in the search path, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM level privileges on the system.
Impact
- Command Execution
- Denial of Service
- Code Execution
Indicators Of Compromise
CVE
- CVE-2022-43724
- CVE-2022-43723
- CVE-2022-43722
Affected Vendors
Siemens
Affected Products
- Siemens SICAM PAS
- Siemens SICAM PQS
Remediation
Refer to Siemens Security Advisory for patch, upgrade or suggested workaround information