{"api_version":"1","generated_at":"2026-04-22T19:36:21+00:00","cve":"CVE-2022-25311","urls":{"html":"https://cve.report/CVE-2022-25311","api":"https://cve.report/api/cve/CVE-2022-25311.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-25311","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-25311"},"summary":{"title":"CVE-2022-25311","description":"A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected software do not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low privileged user to achieve privilege escalation.","state":"PUBLIC","assigner":"productcert@siemens.com","published_at":"2022-03-08 12:15:00","updated_at":"2023-10-10 11:15:00"},"problem_types":["CWE-269"],"metrics":[],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf","name":"N/A","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-25311","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25311","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"25311","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinec_network_management_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"25311","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinema_server","cpe6":"14.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-25311","qid":"590805","title":"Siemens SINEC NMS Multiple Vulnerabilities (ICSA-22-069-03,SSA-250085)"},{"cve":"CVE-2022-25311","qid":"591313","title":"Siemens SINEC NMS Multiple Vulnerabilities (SSA-250085)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-25311","ASSIGNER":"productcert@siemens.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected software do not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low privileged user to achieve privilege escalation."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269: Improper Privilege Management","cweId":"CWE-269"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Siemens","product":{"product_data":[{"product_name":"SINEC NMS","version":{"version_data":[{"version_affected":"=","version_value":"All versions >= V1.0.3 < V2.0"},{"version_affected":"=","version_value":"All versions < V1.0.3"}]}},{"product_name":"SINEMA Server V14","version":{"version_data":[{"version_affected":"=","version_value":"All versions"}]}}]}}]}},"references":{"reference_data":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf","refsource":"MISC","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf"}]},"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:T/RC:C","baseScore":7.3,"baseSeverity":"HIGH"}]}},"nvd":{"publishedDate":"2022-03-08 12:15:00","lastModifiedDate":"2023-10-10 11:15:00","problem_types":["CWE-269"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.3,"baseSeverity":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinema_server:14.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}