CVE-2022-46144

CVSS V2 None CVSS V3 None
Description
A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.
Overview
  • CVE ID
  • CVE-2022-46144
  • Assigner
  • productcert@siemens.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-12-13T16:15:25
  • Last Modified Date
  • 2023-04-11T10:15:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:siemens:6gk5622-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5622-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5626-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5626-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5632-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5632-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5636-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5636-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5642-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5642-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5646-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3 3.0
cpe:2.3:h:siemens:6gk5646-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5622-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5622-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5626-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5626-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5632-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5632-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5636-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5636-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5642-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5642-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:siemens:6gk5646-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:h:siemens:6gk5646-2gs00-2ac2:-:*:*:*:*:*:*:* 0 OR
References
History
Created Old Value New Value Data Type Notes
2022-12-13 16:18:30 Added to TrackCVE
2022-12-13 17:22:03 2022-12-13T16:15:25.200 2022-12-13T16:15:25 CVE Published Date updated
2022-12-13 17:22:03 2022-12-13T17:15:17 CVE Modified Date updated
2022-12-13 17:22:03 Received Awaiting Analysis Vulnerability Status updated
2022-12-13 17:22:03 A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. Description updated
2022-12-15 16:18:07 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-15 21:13:58 2022-12-15T20:34:29 CVE Modified Date updated
2022-12-15 21:13:58 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-15 21:13:58 NVD-CWE-Other Weakness Enumeration new
2022-12-15 21:13:59 CPE Information updated
2023-03-14 12:14:51 2023-03-14T10:15:25 CVE Modified Date updated
2023-03-14 12:14:51 Analyzed Modified Vulnerability Status updated
2023-03-14 12:14:56 Weakness Enumeration update
2023-04-11 12:14:09 2023-04-11T10:15:17 CVE Modified Date updated
2023-04-11 12:14:13 A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. Description updated