{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-46144","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","dateUpdated":"2025-04-21T13:42:58.124Z","dateReserved":"2022-11-28T00:00:00.000Z","datePublished":"2022-12-13T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-01-14T10:27:12.880Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial  interface irresponsive."}],"affected":[{"vendor":"Siemens","product":"SCALANCE SC622-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC622-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC626-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC626-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC632-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC632-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC636-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC636-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC642-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC642-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC646-2C","versions":[{"status":"affected","version":"0","lessThan":"V2.3","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE SC646-2C","versions":[{"status":"affected","version":"V2.3","lessThan":"V3.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WAM763-1","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WAM766-1","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WAM766-1 (US)","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WAM766-1 EEC","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WAM766-1 EEC (US)","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WUM763-1","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WUM763-1","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WUM766-1","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SCALANCE WUM766-1 (USA)","versions":[{"status":"affected","version":"0","lessThan":"V2.0.0","versionType":"custom"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","baseScore":7.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-664","description":"CWE-664: Improper Control of a Resource Through its Lifetime","type":"CWE"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-413565.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-690517.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:24:03.262Z"},"title":"CVE Program Container","references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-413565.html","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-690517.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-18T15:14:39.836171Z","id":"CVE-2022-46144","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T13:42:58.124Z"}}]}}