Vulnerability Description
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | 7Kg9501-0Aa01-2Aa1 Firmware | < 2.50 |
| Siemens | 7Kg9501-0Aa01-2Aa1 | - |
| Siemens | 7Kg9501-0Aa31-2Aa1 Firmware | < 2.50 |
| Siemens | 7Kg9501-0Aa31-2Aa1 | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdfMitigationPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-570294.pdfMitigationPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf
FAQ
What is CVE-2022-43398?
CVE-2022-43398 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q1...
How severe is CVE-2022-43398?
CVE-2022-43398 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43398?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens 7Kg9501-0Aa01-2Aa1 Firmware, Siemens 7Kg9501-0Aa01-2Aa1, Siemens 7Kg9501-0Aa31-2Aa1 Firmware, Siemens 7Kg9501-0Aa31-2Aa1.