A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
7kg8500-0aa00-0aa0
Subscribe
7kg8500-0aa00-0aa0 Firmware
Subscribe
7kg8500-0aa00-2aa0
Subscribe
7kg8500-0aa00-2aa0 Firmware
Subscribe
7kg8500-0aa10-0aa0
Subscribe
7kg8500-0aa10-0aa0 Firmware
Subscribe
7kg8500-0aa10-2aa0
Subscribe
7kg8500-0aa10-2aa0 Firmware
Subscribe
7kg8500-0aa30-0aa0
Subscribe
7kg8500-0aa30-0aa0 Firmware
Subscribe
7kg8500-0aa30-2aa0
Subscribe
7kg8500-0aa30-2aa0 Firmware
Subscribe
7kg8501-0aa01-0aa0
Subscribe
7kg8501-0aa01-0aa0 Firmware
Subscribe
7kg8501-0aa01-2aa0
Subscribe
7kg8501-0aa01-2aa0 Firmware
Subscribe
7kg8501-0aa02-0aa0
Subscribe
7kg8501-0aa02-0aa0 Firmware
Subscribe
7kg8501-0aa02-2aa0
Subscribe
7kg8501-0aa02-2aa0 Firmware
Subscribe
7kg8501-0aa11-0aa0
Subscribe
7kg8501-0aa11-0aa0 Firmware
Subscribe
7kg8501-0aa11-2aa0
Subscribe
7kg8501-0aa11-2aa0 Firmware
Subscribe
7kg8501-0aa12-0aa0
Subscribe
7kg8501-0aa12-0aa0 Firmware
Subscribe
7kg8501-0aa12-2aa0
Subscribe
7kg8501-0aa12-2aa0 Firmware
Subscribe
7kg8501-0aa31-0aa0
Subscribe
7kg8501-0aa31-0aa0 Firmware
Subscribe
7kg8501-0aa31-2aa0
Subscribe
7kg8501-0aa31-2aa0 Firmware
Subscribe
7kg8501-0aa32-0aa0
Subscribe
7kg8501-0aa32-0aa0 Firmware
Subscribe
7kg8501-0aa32-2aa0
Subscribe
7kg8501-0aa32-2aa0 Firmware
Subscribe
7kg8550-0aa00-0aa0
Subscribe
7kg8550-0aa00-0aa0 Firmware
Subscribe
7kg8550-0aa00-2aa0
Subscribe
7kg8550-0aa00-2aa0 Firmware
Subscribe
7kg8550-0aa10-0aa0
Subscribe
7kg8550-0aa10-0aa0 Firmware
Subscribe
7kg8550-0aa10-2aa0
Subscribe
7kg8550-0aa10-2aa0 Firmware
Subscribe
7kg8550-0aa30-0aa0
Subscribe
7kg8550-0aa30-0aa0 Firmware
Subscribe
7kg8550-0aa30-2aa0
Subscribe
7kg8550-0aa30-2aa0 Firmware
Subscribe
7kg8551-0aa01-0aa0
Subscribe
7kg8551-0aa01-0aa0 Firmware
Subscribe
7kg8551-0aa01-2aa0
Subscribe
7kg8551-0aa01-2aa0 Firmware
Subscribe
7kg8551-0aa02-0aa0
Subscribe
7kg8551-0aa02-0aa0 Firmware
Subscribe
7kg8551-0aa02-2aa0
Subscribe
7kg8551-0aa02-2aa0 Firmware
Subscribe
7kg8551-0aa11-0aa0
Subscribe
7kg8551-0aa11-0aa0 Firmware
Subscribe
7kg8551-0aa11-2aa0
Subscribe
7kg8551-0aa11-2aa0 Firmware
Subscribe
7kg8551-0aa12-0aa0
Subscribe
7kg8551-0aa12-0aa0 Firmware
Subscribe
7kg8551-0aa12-2aa0
Subscribe
7kg8551-0aa12-2aa0 Firmware
Subscribe
7kg8551-0aa31-0aa0
Subscribe
7kg8551-0aa31-0aa0 Firmware
Subscribe
7kg8551-0aa31-2aa0
Subscribe
7kg8551-0aa31-2aa0 Firmware
Subscribe
7kg8551-0aa32-0aa0
Subscribe
7kg8551-0aa32-0aa0 Firmware
Subscribe
7kg8551-0aa32-2aa0
Subscribe
7kg8551-0aa32-2aa0 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34189 | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices allow unauthenticated access to the web interface configuration area. This could allow an attacker to extract internal configuration details or to reconfigure network settings. However, the reconfigured settings cannot be activated unless the role of an authenticated administrator user. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-03T06:33:42.996Z
Reserved: 2022-04-28T00:00:00
Link: CVE-2022-29877
No data.
Status : Modified
Published: 2022-05-20T13:15:16.130
Modified: 2024-11-21T06:59:52.900
Link: CVE-2022-29877
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD