Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23102

EPSS 4.85% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-23102

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens SINEMA Remote Connect Server 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens SINEMA Remote Connect Server是德国西门子(Siemens)公司的一套远程网络管理平台。该平台主要用于远程访问、维护、控制和诊断底层网络。 Siemens SINEMA Remote Connect Server(所有版本 < V2.0)中存在输入验证错误漏洞,攻击者可以通过导致网络钓鱼攻击来诱骗设备上经过身份验证的有效用户单击其中的恶意链接。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensSINEMA Remote Connect Server All versions < V2.0 -

II. Public POCs for CVE-2022-23102

#POC DescriptionSource LinkShenlong Link
1A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-23102.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-23102

登录查看更多情报信息。

Same Patch Batch · Siemens · 2022-02-09 · 23 CVEs total

CVE-2021-372047.5 HIGHSiemens SIMATIC S7-1500系列产品输入验证错误漏洞
CVE-2021-372057.5 HIGHSiemens SIMATIC S7-1500 系列产品输入验证错误漏洞
CVE-2021-371857.5 HIGHSiemens SIMATIC S7-1500 系列产品输入验证错误漏洞
CVE-2021-46152Siemens Simcenter Femap 安全漏洞
CVE-2022-23312Siemens Spectrum Power 跨站脚本漏洞
CVE-2021-46161Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46160Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46159Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46158Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46157Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46156Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46155Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46154Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46153Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-46151Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2021-45106Siemens Sicam Toolbox II 信任管理问题漏洞
CVE-2021-44018多款Siemens产品缓冲区错误漏洞
CVE-2021-44016多款Siemens产品缓冲区错误漏洞
CVE-2021-44000多款Siemens产品缓冲区错误漏洞
CVE-2021-40363Siemens SIMATIC PCS 7和SIMATIC WinCC 授权问题漏洞

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-23102

No comments yet


Leave a comment