{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-40182","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","dateUpdated":"2024-08-03T12:14:40.080Z","dateReserved":"2022-09-08T00:00:00.000Z","datePublished":"2022-10-11T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2022-10-11T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded Chromium-based browser is launched as root with the “--no-sandbox” option. Attackers can add arbitrary JavaScript code inside “Operation” graphics and successfully exploit any number of publicly known vulnerabilities against the version of the embedded Chromium-based browser."}],"affected":[{"vendor":"Siemens","product":"Desigo PXM30-1","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"Desigo PXM30.E","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"Desigo PXM40-1","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"Desigo PXM40.E","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"Desigo PXM50-1","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"Desigo PXM50.E","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"PXG3.W100-1","versions":[{"version":"All versions < V02.20.126.11-37","status":"affected"}]},{"vendor":"Siemens","product":"PXG3.W100-2","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]},{"vendor":"Siemens","product":"PXG3.W200-1","versions":[{"version":"All versions < V02.20.126.11-37","status":"affected"}]},{"vendor":"Siemens","product":"PXG3.W200-2","versions":[{"version":"All versions < V02.20.126.11-41","status":"affected"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-360783.pdf"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-250: Execution with Unnecessary Privileges","cweId":"CWE-250"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:14:40.080Z"},"title":"CVE Program Container","references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-360783.pdf","tags":["x_transferred"]}]}]}}