Vulnerability Description
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product as well as with access to the SFTP server of the affected product (22/tcp), could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Sinec Ins | < 1.0 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdfVendor Advisory
FAQ
What is CVE-2022-45093?
CVE-2022-45093 is a vulnerability with a CVSS score of 8.5 (HIGH). A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product as well ...
How severe is CVE-2022-45093?
CVE-2022-45093 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-45093?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Sinec Ins.