A vulnerability has been identified in SICAM GridEdge (Classic) (All versions < V2.6.6). The affected application does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of a user, such as credentials, in case that user's id is known.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-631336.html | |
| https://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf | Patch Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-631336.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.2 |
| References |
|
|
| Summary | (en) A vulnerability has been identified in SICAM GridEdge (Classic) (All versions < V2.6.6). The affected application does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of a user, such as credentials, in case that user's id is known. |
Information
Published : 2022-06-14 10:15
Updated : 2025-11-12 08:15
NVD link : CVE-2022-30229
Mitre link : CVE-2022-30229
CVE.ORG link : CVE-2022-30229
JSON object : View
Products Affected
siemens
- sicam_gridedge_essential
