First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SICAM PAS/PQS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43724 is classified as a critical vulnerability due to its potential to allow unauthenticated remote code execution.
To mitigate CVE-2022-43724, upgrade SICAM PAS/PQS to version 7.0 or newer and disable the xp_cmdshell feature.
CVE-2022-43724 affects all versions of SICAM PAS/PQS prior to version 7.0.
The risks include exposure of sensitive database credentials and the ability for attackers to execute arbitrary OS commands.
Yes, CVE-2022-43724 can be exploited by unauthenticated remote attackers due to the cleartext transmission of database credentials.