{"api_version":"1","generated_at":"2026-05-02T22:46:01+00:00","cve":"CVE-2021-45460","urls":{"html":"https://cve.report/CVE-2021-45460","api":"https://cve.report/api/cve/CVE-2021-45460.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-45460","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-45460"},"summary":{"title":"CVE-2021-45460","description":"A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system (\"backdoors\") or cause a denial of service.","state":"PUBLIC","assigner":"productcert@siemens.com","published_at":"2022-01-11 12:15:00","updated_at":"2022-01-18 20:29:00"},"problem_types":["CWE-428"],"metrics":[],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-45460","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45460","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"45460","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"sicam_pq_analyzer","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"45460","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"sicam_pq_analyzer_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-45460","qid":"590800","title":"Siemens SICAM PQ Analyzer Denial of Service (DoS) Vulnerability (ICSA-22-013-06)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"productcert@siemens.com","ID":"CVE-2021-45460","STATE":"PUBLIC"},"data_format":"MITRE","data_version":"4.0","data_type":"CVE","affects":{"vendor":{"vendor_data":[{"vendor_name":"Siemens","product":{"product_data":[{"product_name":"SICAM PQ Analyzer","version":{"version_data":[{"version_value":"All versions <  V3.18"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-428: Unquoted Search Path or Element"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system (\"backdoors\") or cause a denial of service."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-173318.pdf"}]}},"nvd":{"publishedDate":"2022-01-11 12:15:00","lastModifiedDate":"2022-01-18 20:29:00","problem_types":["CWE-428"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:sicam_pq_analyzer_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.18","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:sicam_pq_analyzer:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"45460","Ordinal":"223805","Title":"CVE-2021-45460","CVE":"CVE-2021-45460","Year":"2021"},"notes":[]}}}