A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker's credentials or start a Ctrl script).
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2022-12-13T00:00:00.000Z

Updated: 2025-04-21T13:43:45.574Z

Reserved: 2022-11-04T00:00:00.000Z

Link: CVE-2022-44731

cve-icon Vulnrichment

Updated: 2024-08-03T14:01:31.331Z

cve-icon NVD

Status : Modified

Published: 2022-12-13T16:15:24.543

Modified: 2024-11-21T07:28:23.160

Link: CVE-2022-44731

cve-icon Redhat

No data.