First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sipass Integrated Acc-ap | <2.85.43 | |
Siemens Sipass Integrated Acc-ap Firmware | ||
Siemens Sipass Integrated Ac5102 (acc-g2) Firmware | <2.85.44 | |
Siemens Sipass Integrated Ac5102 (acc-g2) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31808 is considered a high severity vulnerability due to the potential for privilege escalation in affected devices.
To mitigate CVE-2022-31808, update the firmware of affected devices to versions V2.85.44 or later for SiPass integrated AC5102 and to V2.85.43 or later for SiPass integrated ACC-AP.
CVE-2022-31808 affects SiPass integrated AC5102 devices running versions prior to V2.85.44 and SiPass integrated ACC-AP devices running versions prior to V2.85.43.
CVE-2022-31808 can be exploited by an authenticated user leveraging improper input sanitization on the telnet command line interface to escalate privileges.
As of now, there are no widely reported exploits specifically targeting CVE-2022-31808, but the vulnerability does pose a risk of privilege escalation.