ID

VAR-202207-0541


CVE

CVE-2022-29560


TITLE

Command injection vulnerability in multiple Siemens products

Trust: 0.8

sources: JVNDB: JVNDB-2022-013270

DESCRIPTION

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < 2.15.1), RUGGEDCOM ROX MX5000RE (All versions < 2.15.1), RUGGEDCOM ROX RX1400 (All versions < 2.15.1), RUGGEDCOM ROX RX1500 (All versions < 2.15.1), RUGGEDCOM ROX RX1501 (All versions < 2.15.1), RUGGEDCOM ROX RX1510 (All versions < 2.15.1), RUGGEDCOM ROX RX1511 (All versions < 2.15.1), RUGGEDCOM ROX RX1512 (All versions < 2.15.1), RUGGEDCOM ROX RX1524 (All versions < 2.15.1), RUGGEDCOM ROX RX1536 (All versions < 2.15.1), RUGGEDCOM ROX RX5000 (All versions < 2.15.1). Affected devices do not properly validate user input, making them susceptible to command injection. An attacker with access to either the shell or the web CLI with administrator privileges could access the underlying operating system as the root user. RUGGEDCOM ROX RX1500 firmware, RUGGEDCOM ROX RX1501 firmware, RUGGEDCOM ROX RX1510 Multiple Siemens products such as firmware contain a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-29560 // JVNDB: JVNDB-2022-013270 // VULMON: CVE-2022-29560

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rox rx1510scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1400scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1512scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1524scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx5000scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1501scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox mx5000rescope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1511scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox mx5000scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1500scope:ltversion:2.15.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1536scope:ltversion:2.15.1

Trust: 1.0

vendor:シーメンスmodel:ruggedcom rox rx1501scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1511scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1510scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1512scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000rescope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1500scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx5000scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1400scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1524scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1536scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013270 // NVD: CVE-2022-29560

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-29560
value: HIGH

Trust: 1.0

NVD: CVE-2022-29560
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-839
value: HIGH

Trust: 0.6

VULMON: CVE-2022-29560
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-29560
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-29560
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-29560
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-29560 // JVNDB: JVNDB-2022-013270 // CNNVD: CNNVD-202207-839 // NVD: CVE-2022-29560

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-013270 // NVD: CVE-2022-29560

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-839

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202207-839

PATCH

title:Siemens RUGGEDCOM ROX Repairs for Series Command Injection Vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201839

Trust: 0.6

sources: CNNVD: CNNVD-202207-839

EXTERNAL IDS

db:NVDid:CVE-2022-29560

Trust: 3.3

db:SIEMENSid:SSA-599506

Trust: 2.5

db:ICS CERTid:ICSA-22-195-05

Trust: 1.5

db:JVNid:JVNVU97764115

Trust: 0.8

db:JVNDBid:JVNDB-2022-013270

Trust: 0.8

db:CS-HELPid:SB2022071334

Trust: 0.6

db:CNNVDid:CNNVD-202207-839

Trust: 0.6

db:VULMONid:CVE-2022-29560

Trust: 0.1

sources: VULMON: CVE-2022-29560 // JVNDB: JVNDB-2022-013270 // CNNVD: CNNVD-202207-839 // NVD: CVE-2022-29560

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-599506.pdf

Trust: 2.5

url:https://jvn.jp/vu/jvnvu97764115/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-29560

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-05

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022071334

Trust: 0.6

url:https://vigilance.fr/vulnerability/siemens-ruggedcom-rox-privilege-escalation-38774

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-29560/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-195-05

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-05

Trust: 0.1

sources: VULMON: CVE-2022-29560 // JVNDB: JVNDB-2022-013270 // CNNVD: CNNVD-202207-839 // NVD: CVE-2022-29560

CREDITS

Michael Messner of Siemens Energy reported this vulnerability to Siemens.

Trust: 0.6

sources: CNNVD: CNNVD-202207-839

SOURCES

db:VULMONid:CVE-2022-29560
db:JVNDBid:JVNDB-2022-013270
db:CNNVDid:CNNVD-202207-839
db:NVDid:CVE-2022-29560

LAST UPDATE DATE

2024-08-14T13:42:37.052000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-29560date:2022-07-19T00:00:00
db:JVNDBid:JVNDB-2022-013270date:2023-09-06T08:24:00
db:CNNVDid:CNNVD-202207-839date:2022-07-29T00:00:00
db:NVDid:CVE-2022-29560date:2022-07-19T18:12:33.017

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-29560date:2022-07-12T00:00:00
db:JVNDBid:JVNDB-2022-013270date:2023-09-06T00:00:00
db:CNNVDid:CNNVD-202207-839date:2022-07-12T00:00:00
db:NVDid:CVE-2022-29560date:2022-07-12T10:15:10.493