First published: Tue Jun 21 2022(Updated: )
A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Wincc Open Architecture | =3.16 | |
Siemens Wincc Open Architecture | =3.17 | |
Siemens Wincc Open Architecture | =3.18 | |
Siemens Cerberus Dms | ||
Siemens Desigo Cc | ||
Siemens Desigo Cc Compact |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33139 is critical with a severity score of 9.8.
Cerberus DMS, Desigo CC, Desigo CC Compact, SIMATIC WinCC OA V3.16, SIMATIC WinCC OA V3.17, and SIMATIC WinCC OA V3.18 are affected by CVE-2022-33139.
The Common Weakness Enumeration (CWE) ID for CVE-2022-33139 is CWE-603 and CWE-287.
Yes, Siemens has released security advisories with patches to address CVE-2022-33139. Please refer to the provided references for more information.
You can find more information about CVE-2022-33139 in the provided references: [link1], [link2].