Overview
- Description
- A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
- Source
- productcert@siemens.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28970CC4-B11E-4B5A-88D2-CA6528CAB36A", "versionEndIncluding": "10.2" }, { "criteria": "cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1CF92BC-570F-47BC-AF65-449FAB7E3E3F", "versionEndExcluding": "10.3.3.2.14", "versionStartIncluding": "10.3" }, { "criteria": "cpe:2.3:a:siemens:comos:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D578C144-C298-4491-A426-257E496356A8" } ], "operator": "OR" } ] } ]