CVE-2023-44373

Published Nov 14, 2023

Last updated 12 days ago

Overview

Description
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
Source
productcert@siemens.com
NVD status
Modified
Products
6gk5205-3bb00-2ab2_firmware, 6gk5205-3bb00-2tb2_firmware, 6gk5205-3bd00-2tb2_firmware, 6gk5205-3bd00-2ab2_firmware, 6gk5205-3bf00-2tb2_firmware, 6gk5205-3bf00-2ab2_firmware, 6gk5208-0ba00-2tb2_firmware, 6gk5208-0ba00-2ab2_firmware, 6gk5213-3bd00-2tb2_firmware, 6gk5213-3bd00-2ab2_firmware, 6gk5213-3bb00-2tb2_firmware, 6gk5213-3bb00-2ab2_firmware, 6gk5213-3bf00-2tb2_firmware, 6gk5213-3bf00-2ab2_firmware, 6gk5216-0ba00-2tb2_firmware, 6gk5216-0ba00-2ab2_firmware, 6gk5206-2bd00-2ac2_firmware, 6gk5206-2bb00-2ac2_firmware, 6gk5206-2rs00-2ac2_firmware, 6gk5206-2rs00-5ac2_firmware, 6gk5206-2rs00-5fc2_firmware, 6gk5206-2bs00-2ac2_firmware, 6gk5206-2bs00-2fc2_firmware, 6gk5206-2gs00-2ac2_firmware, 6gk5206-2gs00-2tc2_firmware, 6gk5206-2gs00-2fc2_firmware, 6gk5208-0ba00-2ac2_firmware, 6gk5208-0ba00-2fc2_firmware, 6gk5208-0ga00-2ac2_firmware, 6gk5208-0ga00-2tc2_firmware, 6gk5208-0ga00-2fc2_firmware, 6gk5208-0ra00-2ac2_firmware, 6gk5208-0ra00-5ac2_firmware, 6gk5216-0ba00-2ac2_firmware, 6gk5216-3rs00-2ac2_firmware, 6gk5216-3rs00-5ac2_firmware, 6gk5216-4bs00-2ac2_firmware, 6gk5216-4gs00-2ac2_firmware, 6gk5216-4gs00-2tc2_firmware, 6gk5216-4gs00-2fc2_firmware, 6gk5216-0ba00-2fc2_firmware, 6gk5224-0ba00-2ac2_firmware, 6gk5224-4gs00-2ac2_firmware, 6gk5224-4gs00-2tc2_firmware, 6gk5224-4gs00-2fc2_firmware, 6gk5204-0ba00-2gf2_firmware, 6gk5204-0ba00-2yf2_firmware, 6gk5204-2aa00-2gf2_firmware, 6gk5204-2aa00-2yf2_firmware, 6gk5208-0ha00-2as6_firmware, 6gk5208-0ha00-2ts6_firmware, 6gk5208-0ha00-2es6_firmware, 6gk5208-0ua00-5es6_firmware, 6gk5216-0ha00-2as6_firmware, 6gk5216-0ha00-2ts6_firmware, 6gk5216-0ha00-2es6_firmware, 6gk5216-0ua00-5es6_firmware, 6gk5324-0ba00-3ar3_firmware, 6gk5324-0ba00-2ar3_firmware, 6gk5326-2qs00-3ar3_firmware, 6gk5326-2qs00-3rr3_firmware, 6gk5328-4fs00-3ar3_firmware, 6gk5328-4fs00-3rr3_firmware, 6gk5328-4fs00-2ar3_firmware, 6gk5328-4fs00-2rr3_firmware, 6gk5328-4ss00-3ar3_firmware, 6gk5328-4ss00-2ar3_firmware, 6ag1206-2bb00-7ac2_firmware, 6ag1206-2bs00-7ac2_firmware, 6ag1208-0ba00-7ac2_firmware, 6ag1216-4bs00-7ac2_firmware

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.1

Type
Secondary
Base score
9.1
Impact score
6
Exploitability score
2.3
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

productcert@siemens.com
CWE-74

Social media

Hype score
Not currently trending

Configurations