A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker can perform a range of attacks against the device, such as read arbitrary files on the filesystem, execute arbitrary JavaScript code in order to steal or manipulate the information on the screen, or trigger denial of service conditions.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Desigo Pxm30-1
Subscribe
Desigo Pxm30-1 Firmware
Subscribe
Desigo Pxm30.e
Subscribe
Desigo Pxm30.e Firmware
Subscribe
Desigo Pxm40-1
Subscribe
Desigo Pxm40-1 Firmware
Subscribe
Desigo Pxm40.e
Subscribe
Desigo Pxm40.e Firmware
Subscribe
Desigo Pxm50-1
Subscribe
Desigo Pxm50-1 Firmware
Subscribe
Desigo Pxm50.e
Subscribe
Desigo Pxm50.e Firmware
Subscribe
Pxg3.w100-1
Subscribe
Pxg3.w100-1 Firmware
Subscribe
Pxg3.w100-2
Subscribe
Pxg3.w100-2 Firmware
Subscribe
Pxg3.w200-1
Subscribe
Pxg3.w200-1 Firmware
Subscribe
Pxg3.w200-2
Subscribe
Pxg3.w200-2 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43484 | A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker can perform a range of attacks against the device, such as read arbitrary files on the filesystem, execute arbitrary JavaScript code in order to steal or manipulate the information on the screen, or trigger denial of service conditions. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-03T12:14:39.647Z
Reserved: 2022-09-08T00:00:00
Link: CVE-2022-40181
No data.
Status : Modified
Published: 2022-10-11T11:15:10.767
Modified: 2024-11-21T07:21:00.707
Link: CVE-2022-40181
No data.
OpenCVE Enrichment
No data.
EUVD