{"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-12-09T10:36:29.341Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not properly handle the input of a GET request parameter. The provided argument is directly reflected in the web server response. This could allow an unauthenticated attacker to perform reflected XSS attacks."}],"affected":[{"vendor":"Siemens","product":"SICAM T","versions":[{"status":"affected","version":"0","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L","baseScore":7.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"references":[{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-165073.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-471761.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:33:42.955Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-165073.pdf"}]}]},"cveMetadata":{"assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","cveId":"CVE-2022-29876","datePublished":"2022-05-10T09:47:19.000Z","dateReserved":"2022-04-28T00:00:00.000Z","dateUpdated":"2025-12-09T10:36:29.341Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}