Vulnerability Description
A vulnerability has been identified in Building X - Security Manager Edge Controller (ACC-AP) (All versions). Affected devices do not properly check the integrity of firmware updates. This could allow a local attacker to upload a maliciously modified firmware onto the device. In a second scenario, a remote attacker who is able to intercept the transfer of a valid firmware from the server to the device could modify the firmware "on the fly".
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Sipass Integrated Ac5102 \(Acc-G2\) Firmware | All versions |
| Siemens | Sipass Integrated Ac5102 \(Acc-G2\) | - |
| Siemens | Sipass Integrated Acc-Ap Firmware | All versions |
| Siemens | Sipass Integrated Acc-Ap | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-367714.htmlVendor Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-420375.html
FAQ
What is CVE-2022-31807?
CVE-2022-31807 is a vulnerability with a CVSS score of 6.2 (MEDIUM). A vulnerability has been identified in Building X - Security Manager Edge Controller (ACC-AP) (All versions). Affected devices do not properly check the integrity of firmware updates. This could allow...
How severe is CVE-2022-31807?
CVE-2022-31807 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31807?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Sipass Integrated Ac5102 \(Acc-G2\) Firmware, Siemens Sipass Integrated Ac5102 \(Acc-G2\), Siemens Sipass Integrated Acc-Ap Firmware, Siemens Sipass Integrated Acc-Ap.