Description
A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34188 | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks. |
References
History
Tue, 09 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks. | A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks. |
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Subscriptions
Siemens
Subscribe
7kg8500-0aa00-0aa0
Subscribe
7kg8500-0aa00-0aa0 Firmware
Subscribe
7kg8500-0aa00-2aa0
Subscribe
7kg8500-0aa00-2aa0 Firmware
Subscribe
7kg8500-0aa10-0aa0
Subscribe
7kg8500-0aa10-0aa0 Firmware
Subscribe
7kg8500-0aa10-2aa0
Subscribe
7kg8500-0aa10-2aa0 Firmware
Subscribe
7kg8500-0aa30-0aa0
Subscribe
7kg8500-0aa30-0aa0 Firmware
Subscribe
7kg8500-0aa30-2aa0
Subscribe
7kg8500-0aa30-2aa0 Firmware
Subscribe
7kg8501-0aa01-0aa0
Subscribe
7kg8501-0aa01-0aa0 Firmware
Subscribe
7kg8501-0aa01-2aa0
Subscribe
7kg8501-0aa01-2aa0 Firmware
Subscribe
7kg8501-0aa02-0aa0
Subscribe
7kg8501-0aa02-0aa0 Firmware
Subscribe
7kg8501-0aa02-2aa0
Subscribe
7kg8501-0aa02-2aa0 Firmware
Subscribe
7kg8501-0aa11-0aa0
Subscribe
7kg8501-0aa11-0aa0 Firmware
Subscribe
7kg8501-0aa11-2aa0
Subscribe
7kg8501-0aa11-2aa0 Firmware
Subscribe
7kg8501-0aa12-0aa0
Subscribe
7kg8501-0aa12-0aa0 Firmware
Subscribe
7kg8501-0aa12-2aa0
Subscribe
7kg8501-0aa12-2aa0 Firmware
Subscribe
7kg8501-0aa31-0aa0
Subscribe
7kg8501-0aa31-0aa0 Firmware
Subscribe
7kg8501-0aa31-2aa0
Subscribe
7kg8501-0aa31-2aa0 Firmware
Subscribe
7kg8501-0aa32-0aa0
Subscribe
7kg8501-0aa32-0aa0 Firmware
Subscribe
7kg8501-0aa32-2aa0
Subscribe
7kg8501-0aa32-2aa0 Firmware
Subscribe
7kg8550-0aa00-0aa0
Subscribe
7kg8550-0aa00-0aa0 Firmware
Subscribe
7kg8550-0aa00-2aa0
Subscribe
7kg8550-0aa00-2aa0 Firmware
Subscribe
7kg8550-0aa10-0aa0
Subscribe
7kg8550-0aa10-0aa0 Firmware
Subscribe
7kg8550-0aa10-2aa0
Subscribe
7kg8550-0aa10-2aa0 Firmware
Subscribe
7kg8550-0aa30-0aa0
Subscribe
7kg8550-0aa30-0aa0 Firmware
Subscribe
7kg8550-0aa30-2aa0
Subscribe
7kg8550-0aa30-2aa0 Firmware
Subscribe
7kg8551-0aa01-0aa0
Subscribe
7kg8551-0aa01-0aa0 Firmware
Subscribe
7kg8551-0aa01-2aa0
Subscribe
7kg8551-0aa01-2aa0 Firmware
Subscribe
7kg8551-0aa02-0aa0
Subscribe
7kg8551-0aa02-0aa0 Firmware
Subscribe
7kg8551-0aa02-2aa0
Subscribe
7kg8551-0aa02-2aa0 Firmware
Subscribe
7kg8551-0aa11-0aa0
Subscribe
7kg8551-0aa11-0aa0 Firmware
Subscribe
7kg8551-0aa11-2aa0
Subscribe
7kg8551-0aa11-2aa0 Firmware
Subscribe
7kg8551-0aa12-0aa0
Subscribe
7kg8551-0aa12-0aa0 Firmware
Subscribe
7kg8551-0aa12-2aa0
Subscribe
7kg8551-0aa12-2aa0 Firmware
Subscribe
7kg8551-0aa31-0aa0
Subscribe
7kg8551-0aa31-0aa0 Firmware
Subscribe
7kg8551-0aa31-2aa0
Subscribe
7kg8551-0aa31-2aa0 Firmware
Subscribe
7kg8551-0aa32-0aa0
Subscribe
7kg8551-0aa32-0aa0 Firmware
Subscribe
7kg8551-0aa32-2aa0
Subscribe
7kg8551-0aa32-2aa0 Firmware
Subscribe
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-12-09T10:36:29.341Z
Reserved: 2022-04-28T00:00:00.000Z
Link: CVE-2022-29876
No data.
Status : Modified
Published: 2022-05-20T13:15:16.083
Modified: 2025-12-09T16:17:13.573
Link: CVE-2022-29876
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD