First published: Tue Jan 10 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product as well as with access to the SFTP server of the affected product (22/tcp), could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
<1.0 | ||
=1.0 | ||
=1.0-sp1 | ||
=1.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-45093 is high (8.8).
The affected software for CVE-2022-45093 is Siemens Sinec Ins (all versions < V1.0 SP2 Update 1).
An authenticated remote attacker with access to the Web Based Management (443/tcp) and the SFTP server (22/tcp) of the affected product can potentially read and write data.
To fix CVE-2022-45093, upgrade to version V1.0 SP2 Update 1 or a later version of Siemens Sinec Ins.
The Common Weakness Enumeration (CWE) for CVE-2022-45093 is CWE-22.