Unknown
CVE-2022-29875
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-29875
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability has been identified in Biograph Horizon PET/CT Systems (All VJ30 versions < VJ30C-UD01), MAGNETOM Family (NUMARIS X: VA12M, VA12S, VA10B, VA20A, VA30A, VA31A), MAMMOMAT Revelation (All VC20 versions < VC20D), NAEOTOM Alpha (All VA40 versions < VA40 SP2), SOMATOM X.cite (All versions < VA30 SP5 or VA40 SP2), SOMATOM X.creed (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.All (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.Now (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.Open Pro (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.Sim (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.Top (All versions < VA30 SP5 or VA40 SP2), SOMATOM go.Up (All versions < VA30 SP5 or VA40 SP2), Symbia E/S (All VB22 versions < VB22A-UD03), Symbia Evo (All VB22 versions < VB22A-UD03), Symbia Intevo (All VB22 versions < VB22A-UD03), Symbia T (All VB22 versions < VB22A-UD03), Symbia.net (All VB22 versions < VB22A-UD03), syngo.via VB10 (All versions), syngo.via VB20 (All versions), syngo.via VB30 (All versions), syngo.via VB40 (All versions < VB40B HF06), syngo.via VB50 (All versions), syngo.via VB60 (All versions < VB60B HF02). The application deserialises untrusted data without sufficient validations that could result in an arbitrary deserialization. This could allow an unauthenticated attacker to execute code in the affected system if ports 32912/tcp or 32914/tcp are reachable.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- biograph horizon pet/ct systems firmware,
- magnetom numaris x firmware va10b,
- magnetom numaris x firmware va12m,
- magnetom numaris x firmware va12s,
- magnetom numaris x firmware va20a,
- magnetom numaris x firmware va30a,
- magnetom numaris x firmware va31a,
- mammomat revelation firmware,
- naeotom alpha firmware va40,
- somatom go.all firmware,
- somatom go.all firmware va30,
- somatom go.all firmware va40,
- somatom go.now firmware,
- somatom go.now firmware va30,
- somatom go.now firmware va40,
- somatom go.open pro firmware,
- somatom go.open pro firmware va30,
- somatom go.open pro firmware va40,
- somatom go.sim firmware,
- somatom go.sim firmware va30,
- somatom go.sim firmware va40,
- somatom go.up firmware,
- somatom go.up firmware va30,
- somatom go.up firmware va40,
- somatom x.cite firmware,
- somatom x.cite firmware va30,
- somatom x.cite firmware va40,
- somatom x.creed firmware,
- somatom x.creed firmware va30,
- somatom x.creed firmware va40,
- symbia e firmware,
- symbia evo firmware,
- symbia intevo firmware,
- symbia s firmware,
- symbia t firmware,
- symbia.net,
- syngo.via,
- syngo.via vb10,
- syngo.via vb20,
- syngo.via vb30,
- syngo.via vb40b,
- syngo.via vb50,
- syngo.via vb60b
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: