U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:siemens:6ag1208-0ba00-7ac2_firmware:-:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 8 matching records.
Displaying matches 1 through 8.
Vuln ID Summary CVSS Severity
CVE-2023-44374

Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges.

Published: November 14, 2023; 6:15:13 AM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-44373

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.

Published: November 14, 2023; 6:15:13 AM -0500
V3.1: 9.1 CRITICAL
V2.0:(not available)
CVE-2023-44322

Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.

Published: November 14, 2023; 6:15:13 AM -0500
V3.1: 5.9 MEDIUM
V2.0:(not available)
CVE-2023-44321

Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.

Published: November 14, 2023; 6:15:12 AM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-44320

Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator.

Published: November 14, 2023; 6:15:12 AM -0500
V3.1: 4.3 MEDIUM
V2.0:(not available)
CVE-2023-44319

Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device.

Published: November 14, 2023; 6:15:12 AM -0500
V3.1: 4.9 MEDIUM
V2.0:(not available)
CVE-2023-44318

Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.

Published: November 14, 2023; 6:15:12 AM -0500
V3.1: 4.9 MEDIUM
V2.0:(not available)
CVE-2022-31765

Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges.

Published: October 11, 2022; 7:15:09 AM -0400
V3.1: 8.8 HIGH
V2.0:(not available)