9.1
CRITICAL
CVE-2022-36323
Apache HTTP Server Code Injection Vulnerability
Description

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

INFO

Published Date :

Aug. 10, 2022, 12:15 p.m.

Last Modified :

June 27, 2023, 7:43 p.m.

Remotely Exploitable :

Yes !

Impact Score :

6.0

Exploitability Score :

2.3
Affected Products

The following products are affected by CVE-2022-36323 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Siemens scalance_m-800_firmware
2 Siemens scalance_s615_firmware
3 Siemens scalance_sc-600_firmware
4 Siemens scalance_xm408-4c_firmware
5 Siemens scalance_xm408-4c_l3_firmware
6 Siemens scalance_xm408-8c_firmware
7 Siemens scalance_xm408-8c_l3_firmware
8 Siemens scalance_xm416-4c_firmware
9 Siemens scalance_xm416-4c_l3_firmware
10 Siemens scalance_xr524-8c_firmware
11 Siemens scalance_xr524-8c_l3_firmware
12 Siemens scalance_xr526-8c_firmware
13 Siemens scalance_xr528-6m_firmware
14 Siemens scalance_xr528-6m_2hr2_firmware
15 Siemens scalance_xr528-6m_2hr2_l3_firmware
16 Siemens scalance_xr528-6m_l3_firmware
17 Siemens scalance_xr552-12m_firmware
18 Siemens scalance_xr552-12m_2hr2_firmware
19 Siemens scalance_xr552-12m_2hr2_l3_firmware
20 Siemens scalance_xp-200_firmware
21 Siemens scalance_xc-200_firmware
22 Siemens scalance_xf204-2ba_irt_firmware
23 Siemens scalance_sc632-2c_firmware
24 Siemens scalance_sc636-2c_firmware
25 Siemens scalance_sc642-2c_firmware
26 Siemens scalance_sc646-2c_firmware
27 Siemens scalance_sc622-2c_firmware
28 Siemens scalance_xb-200_firmware
29 Siemens scalance_xf-200ba_firmware
30 Siemens scalance_xr-300wg_firmware
31 Siemens scalance_xf204_firmware
32 Siemens scalance_xm400_firmware
33 Siemens scalance_xr324-4m_eec_firmware
34 Siemens scalance_xr324-4m_poe_firmware
35 Siemens scalance_xr324-4m_poe_ts_firmware
36 Siemens scalance_xr324-12m_firmware
37 Siemens scalance_xr324-12m_ts_firmware
38 Siemens scalance_xr500_firmware
39 Siemens scalance_m804pb_firmware
40 Siemens scalance_m874-2_firmware
41 Siemens scalance_m874-3_firmware
42 Siemens ruggedcom_rm1224_lte\(4g\)_eu_firmware
43 Siemens ruggedcom_rm1224_lte\(4g\)_nam_firmware
44 Siemens scalance_m826-2_shdsl-router_firmware
45 Siemens scalance_sc626-2c_firmware
46 Siemens scalance_w721-1_rj45_firmware
47 Siemens scalance_w722-1_rj45_firmware
48 Siemens scalance_w734-1_rj45_firmware
49 Siemens scalance_w738-1_m12_firmware
50 Siemens scalance_w748-1_m12_firmware
51 Siemens scalance_w761-1_rj45_firmware
52 Siemens scalance_w774-1_m12_eec_firmware
53 Siemens scalance_w774-1_rj45_firmware
54 Siemens scalance_w778-1_m12_firmware
55 Siemens scalance_w778-1_m12_eec_firmware
56 Siemens scalance_w786-1_rj45_firmware
57 Siemens scalance_w786-2_rj45_firmware
58 Siemens scalance_w786-2_sfp_firmware
59 Siemens scalance_w786-2ia_rj45_firmware
60 Siemens scalance_w788-1_m12_firmware
61 Siemens scalance_w788-1_rj45_firmware
62 Siemens scalance_w788-2_m12_firmware
63 Siemens scalance_w788-2_m12_eec_firmware
64 Siemens scalance_w1748-1_m12_firmware
65 Siemens scalance_w1788-1_m12_firmware
66 Siemens scalance_w1788-2_eec_m12_firmware
67 Siemens scalance_w1788-2_m12_firmware
68 Siemens scalance_w1788-2ia_m12_firmware
69 Siemens scalance_wam763-1_firmware
70 Siemens scalance_wum763-1_firmware
71 Siemens scalance_xb205-3_firmware
72 Siemens scalance_xb205-3ld_firmware
73 Siemens scalance_xb208_firmware
74 Siemens scalance_xb213-3_firmware
75 Siemens scalance_xb213-3ld_firmware
76 Siemens scalance_xb216_firmware
77 Siemens scalance_xc206-2_firmware
78 Siemens scalance_xc206-2g_poe_firmware
79 Siemens scalance_xc206-2g_poe_eec_firmware
80 Siemens scalance_xc206-2sfp_firmware
81 Siemens scalance_xc206-2sfp_eec_firmware
82 Siemens scalance_xc206-2sfp_g_firmware
83 Siemens scalance_xc206-2sfp_g_eec_firmware
84 Siemens scalance_xc208_firmware
85 Siemens scalance_xc216_firmware
86 Siemens scalance_xc216-3g_poe_firmware
87 Siemens scalance_xc216-4c_firmware
88 Siemens scalance_xc216-4c_g_firmware
89 Siemens scalance_xc216-4c_g_eec_firmware
90 Siemens scalance_xc216eec_firmware
91 Siemens scalance_xc224_firmware
92 Siemens scalance_xc224-4c_g_firmware
93 Siemens scalance_xc224-4c_g_eec_firmware
94 Siemens scalance_xf204_dna_firmware
95 Siemens scalance_xf204-2ba_firmware
96 Siemens scalance_xp208_firmware
97 Siemens scalance_xp208eec_firmware
98 Siemens scalance_xp208poe_eec_firmware
99 Siemens scalance_xp216_firmware
100 Siemens scalance_xp216eec_firmware
101 Siemens scalance_xp216poe_eec_firmware
102 Siemens scalance_xr324wg_firmware
103 Siemens scalance_xr328-4c_wg_firmware
104 Siemens siplus_net_scalance_xc206-2_firmware
105 Siemens siplus_net_scalance_xc206-2sfp_firmware
106 Siemens siplus_net_scalance_xc208_firmware
107 Siemens siplus_net_scalance_xc216-4c_firmware
108 Siemens scalance_xr-300_firmware
109 Siemens scalance_w700_ieee_802.11n_firmware
110 Siemens scalance_xr524_firmware
111 Siemens scalance_xr526_firmware
112 Siemens scalance_xr528_firmware
113 Siemens scalance_xr552_firmware
114 Siemens scalance_xc206-2g_poe__firmware
115 Siemens scalance_xc206-2sfp_g_\(e\/ip\)_firmware
116 Siemens scalance_xc208eec_firmware
117 Siemens scalance_xc208g_firmware
118 Siemens scalance_xc208g_\(e\/ip\)_firmware
119 Siemens scalance_xc208g_eec_firmware
120 Siemens scalance_xc208g_poe_firmware
121 Siemens scalance_xc216-4c_g_\(e\/ip\)_firmware
122 Siemens scalance_xc224-4c_g__firmware
123 Siemens scalance_xc224-4c_g_\(e\/ip\)_firmware
124 Siemens scalance_xc224__firmware
125 Siemens scalance_xf204-2ba_dna_firmware
126 Siemens scalance_xp208_\(eip\)_firmware
127 Siemens scalance_xp216_\(eip\)_firmware
128 Siemens scalance_xr326-2c_poe_wg_firmware
129 Siemens scalance_xr552-12_firmware
130 Siemens scalance_w700_ieee_802.11ax_firmware
131 Siemens scalance_xb208_\(e\/ip\)_firmware
132 Siemens scalance_xb208_\(pn\)_firmware
133 Siemens scalance_xb216_\(e\/ip\)_firmware
134 Siemens scalance_xb216_\(pn\)_firmware
135 Siemens scalance_xc206-2_\(sc\)_firmware
136 Siemens scalance_xc206-2_\(st\/bfoc\)_firmware
137 Siemens scalance_xc206-2g_poe_\(54_v_dc\)_firmware
138 Siemens scalance_xc206-2g_poe_eec_\(54_v_dc\)_firmware
139 Siemens scalance_xc206-2sfp_g_\(eip_def.\)_firmware
140 Siemens scalance_xc208g_\(eip_def.\)_firmware
141 Siemens scalance_xc208g_poe_\(54_v_dc\)_firmware
142 Siemens scalance_xc216-3g_poe_\(54_v_dc\)_firmware
143 Siemens scalance_xc216-4c_g_\(eip_def.\)_firmware
144 Siemens scalance_xc224-4c_g_\(eip_def.\)_firmware
145 Siemens scalance_xp208_\(ethernet\/ip\)_firmware
146 Siemens scalance_xp216_\(ethernet\/ip\)_firmware
147 Siemens scalance_xr326-2c_poe_wg_\(without_ul\)_firmware
148 Siemens scalance_w700_ieee_802.11ac_firmware
149 Siemens scalance_xr-300eec_firmware
150 Siemens scalance_xr-300poe_firmware
151 Siemens scalance_xr526-8c_l3_firmware
152 Siemens scalance_m876-3_\(rok\)_firmware
153 Siemens scalance_m876-4_\(eu\)_firmware
154 Siemens scalance_m876-4_\(nam\)_firmware
155 Siemens scalance_mum853-1_\(eu\)_firmware
156 Siemens scalance_mum856-1_\(eu\)_firmware
157 Siemens scalance_mum856-1_\(row\)_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-36323.

URL Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-36323 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-36323 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Jun. 27, 2023

    Action Type Old Value New Value
    Added CWE NIST NVD-CWE-Other
  • CVE Modified by [email protected]

    Apr. 11, 2023

    Action Type Old Value New Value
    Changed Description Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
  • Modified Analysis by [email protected]

    Feb. 23, 2023

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jan. 10, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 Siemens AG AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Modified Analysis by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Sep. 13, 2022

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
  • Initial Analysis by [email protected]

    Aug. 17, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf Patch, Vendor Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc622-2c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc632-2c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc636-2c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc642-2c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.3.1 OR cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_w700_ieee_802.11ax_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_w700_ieee_802.11ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_w700_ieee_802.11n_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_w700_ieee_802.11n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_w700_ieee_802.11ac_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_w700_ieee_802.11ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm400_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm408-4c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm408-4c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm408-4c_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm408-4c_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm408-8c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm408-8c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm408-8c_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm408-8c_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm416-4c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm416-4c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xm416-4c_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xm416-4c_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208_\(eip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216_\(eip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr-300eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr-300eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr-300poe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr-300poe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr324wg_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr324wg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr326-2c_poe_wg_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr326-2c_poe_wg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr328-4c_wg_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr328-4c_wg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr500_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr524_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr524:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr524-8c_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr524-8c_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr526_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr526:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:h:siemens:scalance_xr526-8c_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr526-8c_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr528_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr528:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr528-6m_2hr2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr528-6m_2hr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr528-6m_2hr2_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr528-6m_2hr2_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr528-6m_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr528-6m_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr552_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr552:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr552-12m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr552-12m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr552-12m_2hr2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr552-12m_2hr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xr552-12m_2hr2_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xr552-12m_2hr2_l3:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Aug. 10, 2022

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-36323 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-36323 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-6: Argument Injection Argument Injection CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-28: Fuzzing Fuzzing CAPEC-34: HTTP Response Splitting HTTP Response Splitting CAPEC-42: MIME Conversion MIME Conversion CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-51: Poison Web Service Registry Poison Web Service Registry CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-72: URL Encoding URL Encoding CAPEC-76: Manipulating Web Input to File System Calls Manipulating Web Input to File System Calls CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-83: XPath Injection XPath Injection CAPEC-84: XQuery Injection XQuery Injection CAPEC-101: Server Side Include (SSI) Injection Server Side Include (SSI) Injection CAPEC-105: HTTP Request Splitting HTTP Request Splitting CAPEC-108: Command Line Execution through SQL Injection Command Line Execution through SQL Injection CAPEC-120: Double Encoding Double Encoding CAPEC-135: Format String Injection Format String Injection CAPEC-250: XML Injection XML Injection CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding CAPEC-273: HTTP Response Smuggling HTTP Response Smuggling
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.23 }} 0.02%

score

0.61826

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability