A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded Chromium-based browser is launched as root with the “--no-sandbox” option. Attackers can add arbitrary JavaScript code inside “Operation” graphics and successfully exploit any number of publicly known vulnerabilities against the version of the embedded Chromium-based browser.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-360783.pdf | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2022-10-11T00:00:00
Updated: 2022-10-11T00:00:00
Reserved: 2022-09-08T00:00:00
Link: CVE-2022-40182
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-10-11T11:15:10.823
Modified: 2022-10-12T15:45:40.070
Link: CVE-2022-40182
JSON object: View
Redhat Information
No data.
CWE