CVE-2022-36323

9.1 CRITICAL
Published: August 10, 2022 Modified: April 14, 2026
View on NVD

Description

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf
Source: productcert@siemens.com
Patch Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.1 / 10.0
EPSS (Exploit Probability)
0.6%
69th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

siemens