CVE-2022-24282

A vulnerability has been identified in SINEC NMS (All versions < V1.0.3), SINEC NMS (All versions >= V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.
References
Link Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*

History

14 Mar 2023, 10:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SINEC NMS (All versions < V1.0.3), SINEC NMS (All versions >= V1.0.3). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges. A vulnerability has been identified in SINEC NMS (All versions < V1.0.3), SINEC NMS (All versions >= V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.

11 Oct 2022, 11:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SINEC NMS (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges. A vulnerability has been identified in SINEC NMS (All versions < V1.0.3), SINEC NMS (All versions >= V1.0.3). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.

11 Mar 2022, 18:41

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf - Mitigation, Vendor Advisory
CWE CWE-502
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 7.2

08 Mar 2022, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-08 12:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-24282

Mitre link : CVE-2022-24282

CVE.ORG link : CVE-2022-24282


JSON object : View

Products Affected

siemens

  • sinec_network_management_system
CWE
CWE-502

Deserialization of Untrusted Data