{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:47:32.104","vulnerabilities":[{"cve":{"id":"CVE-2022-33736","sourceIdentifier":"productcert@siemens.com","published":"2022-07-12T10:15:10.813","lastModified":"2024-11-21T07:08:26.150","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Opcenter Quality V13.1 (All versions < V13.1.20220624), Opcenter Quality V13.2 (All versions < V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Opcenter Quality V13.1 (Todas las versiones anteriores a V13.1.20220624), Opcenter Quality V13.2 (Todas las versiones anteriores a V13.2.20220624). Las aplicaciones afectadas no comprueban apropiadamente la información de inicio de sesión durante la autenticación. Esto podría conllevar a una condición de denegación de servicio para usuarios existentes o permitir a atacantes remotos no autenticados iniciar sesión con éxito sin credenciales"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-303"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.20220624","matchCriteriaId":"A15CE102-4776-4D10-8AF2-8F4401AB7797"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*","versionStartIncluding":"13.2.0","versionEndExcluding":"13.2.20220624","matchCriteriaId":"A01A975E-7898-4E21-AFCA-A786D546D959"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-944952.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}