https://hackerone.com/reports/1570651
http://www.nessus.org/u?59ba3f3e
http://www.nessus.org/u?4af41997
https://cert-portal.siemens.com/productcert/html/ssa-558014.html
https://www.debian.org/security/2022/dsa-5197
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://security.netapp.com/advisory/ntap-20220915-0003/
https://support.apple.com/kb/HT213488
https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-09
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/28
https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
Severity: Medium
ID: 500970
Version: 1.4
Type: remote
Family: Tenable.ot
Published: 4/11/2023
Updated: 9/4/2024
Supported Sensors: Tenable OT Security
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.6
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS Score Source: CVE-2022-32206
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 6
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:siemens:scalance_sc626-2c_firmware, cpe:/o:siemens:scalance_sc636-2c_firmware, cpe:/o:siemens:scalance_sc632-2c_firmware, cpe:/o:siemens:scalance_sc622-2c_firmware, cpe:/o:siemens:scalance_sc646-2c_firmware, cpe:/o:siemens:scalance_xcm332_firmware, cpe:/o:siemens:scalance_sc642-2c_firmware
Required KB Items: Tenable.ot/Siemens
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/7/2022
Vulnerability Publication Date: 7/7/2022
CVE: CVE-2022-32206