First published: Tue Jan 10 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially inject commands into the dhcpd configuration of the affected product. An attacker might leverage this to trigger remote code execution on the affected component.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
<1.0 | ||
=1.0 | ||
=1.0-sp1 | ||
=1.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-45094.
The severity level of CVE-2022-45094 is high.
All versions of Siemens SINEC INS prior to V1.0 SP2 Update 1 are affected by CVE-2022-45094.
An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product can potentially inject commands into the dhcpd configuration.
Yes, Siemens has released an update (V1.0 SP2 Update 1) to address CVE-2022-45094. It is recommended to apply the update as soon as possible.