A vulnerability has been identified in SICAM GridEdge (Classic) (All versions < V2.7.3). The affected application uses an improperly protected file to import SSH keys. This could allow attackers with access to the filesystem of the host on which SICAM GridEdge runs to inject a custom SSH key to that file.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-225578.html | |
| https://cert-portal.siemens.com/productcert/pdf/ssa-225578.pdf | Mitigation Patch Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-225578.pdf | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 6.3 |
| CWE | CWE-552 | |
| References |
|
|
| Summary | (en) A vulnerability has been identified in SICAM GridEdge (Classic) (All versions < V2.7.3). The affected application uses an improperly protected file to import SSH keys. This could allow attackers with access to the filesystem of the host on which SICAM GridEdge runs to inject a custom SSH key to that file. |
21 Nov 2024, 07:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-225578.pdf - Mitigation, Patch, Vendor Advisory |
Information
Published : 2022-07-12 10:15
Updated : 2025-11-12 08:15
NVD link : CVE-2022-34464
Mitre link : CVE-2022-34464
CVE.ORG link : CVE-2022-34464
JSON object : View
Products Affected
siemens
- sicam_gridedge_essential_intel
- sicam_gridedge_essential_gds_intel
- sicam_gridedge_essential_arm
- sicam_gridedge_essential_gds_arm
