mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-08 03:27:03 +00:00
Siemens CVE update for Siemens-AD-2020-01
This commit is contained in:
parent
ad996290a7
commit
1147036c9e
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -35,7 +35,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200",
|
||||
"product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -45,7 +45,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200IRT",
|
||||
"product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -55,7 +55,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200RNA",
|
||||
"product_name": "SCALANCE X-200RNA switch family",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -65,11 +65,11 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-300",
|
||||
"product_name": "SCALANCE X-300 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -79,7 +79,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -122,20 +122,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in RFID 181-EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 (All versions < V5.2.3), SCALANCE X-200IRT (All versions < V5.4.1), SCALANCE X-200RNA (All versions < V3.2.6), SCALANCE X-300 (All versions), SCALANCE X408 (All versions), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client\u2019s DHCP request."
|
||||
"value": "A vulnerability has been identified in RFID 181-EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request."
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,47 +1,45 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"DATE_PUBLIC": "2018-06-12T00:00:00",
|
||||
"ID": "CVE-2018-4842",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SCALANCE X-200 IRT, SCALANCE X300",
|
||||
"product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SCALANCE X-200 IRT : All versions < V5.4.1"
|
||||
},
|
||||
"version_value": "All versions < V5.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SCALANCE X300 : All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Siemens AG"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 IRT (All versions < V5.4.1), SCALANCE X300 (All versions). A remote, authenticated attacker with access to the configuration web server could be able to store script code on the web site, if the HRP redundancy option is set. This code could be executed in the web browser of victims visiting this web site (XSS), affecting its confidentiality, integrity and availability. User interaction is required for successful exploitation, as the user needs to visit the manipulated web site."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
@ -54,17 +52,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). A remote, authenticated attacker with access to the configuration web\nserver could be able to store script code on the web site, if the HRP redundancy \noption is set. This code could be executed in the web browser of victims visiting \nthis web site (XSS), affecting its confidentiality, integrity and availability. \n\nUser interaction is required for successful exploitation, as the user needs\nto visit the manipulated web site. At the stage of publishing this security\nadvisory no public exploitation is known. The vendor has confirmed the\nvulnerability and provides mitigations to resolve it.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf"
|
||||
},
|
||||
{
|
||||
"name": "104494",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104494"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,50 +1,55 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"DATE_PUBLIC": "2018-06-12T00:00:00",
|
||||
"ID": "CVE-2018-4848",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SCALANCE X-200, SCALANCE X-200 IRT, SCALANCE X300",
|
||||
"product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SCALANCE X-200 : All versions < V5.2.3"
|
||||
},
|
||||
"version_value": "All versions < V5.2.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SCALANCE X-200 IRT : All versions < V5.4.1"
|
||||
},
|
||||
"version_value": "All versions < V5.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "SCALANCE X300 : All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Siemens AG"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 (All versions < V5.2.3), SCALANCE X-200 IRT (All versions < V5.4.1), SCALANCE X300 (All versions). The integrated configuration web server of the affected Scalance X Switches could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
@ -57,17 +62,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected Scalance X Switches could allow\nCross-Site Scripting (XSS) attacks if unsuspecting users are tricked into\naccessing a malicious link.\n\nUser interaction is required for a successful exploitation. The user must \nbe logged into the web interface in order for the exploitation to succeed.\nAt the stage of publishing this security advisory no public exploitation is known.\nThe vendor has confirmed the vulnerability and provides mitigations to resolve it.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf"
|
||||
},
|
||||
{
|
||||
"name": "104494",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104494"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -65,7 +65,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200IRT",
|
||||
"product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -75,7 +75,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200M",
|
||||
"product_name": "SIMATIC ET200M (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -85,7 +85,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200S",
|
||||
"product_name": "SIMATIC ET200S (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0)",
|
||||
"product_name": "SIMATIC ET200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -105,7 +105,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200pro",
|
||||
"product_name": "SIMATIC ET200pro (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -115,7 +115,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0",
|
||||
"product_name": "SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -125,7 +125,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-300 CPU family (incl. F)",
|
||||
"product_name": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -135,7 +135,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 (incl. F) V6 and below",
|
||||
"product_name": "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -145,7 +145,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 (incl. F)",
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -165,7 +165,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMOTION",
|
||||
"product_name": "SIMOTION (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -195,7 +195,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G110M V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G110M V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -205,7 +205,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G120 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -215,7 +215,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -225,7 +225,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -235,7 +235,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GH150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GH150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -245,7 +245,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GL150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GL150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -255,7 +255,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GM150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GM150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -265,7 +265,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S110 (Control Unit)",
|
||||
"product_name": "SINAMICS S110 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -275,7 +275,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.7 (Control Unit and CBE20)",
|
||||
"product_name": "SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -285,7 +285,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -295,17 +295,17 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS SL150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS SL150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.7 HF33"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS SM120 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS SM120 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -352,25 +352,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-283-01",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-283-01"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in CP1604 (All versions < V2.8), CP1616 (All versions < V2.8), Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions < V4.1.1 Patch 05), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions < V4.5.0 Patch 01), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions < V4.5.0), SCALANCE X-200IRT (All versions < V5.2.1), SIMATIC ET 200M (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0) (All versions), SIMATIC ET 200pro (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (All versions), SIMATIC S7-300 CPU family (incl. F) (All versions), SIMATIC S7-400 (incl. F) V6 and below (All versions), SIMATIC S7-400 PN/DP V7 (incl. F) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SIMOTION (All versions), SINAMICS DCM (All versions < V1.5 HF1), SINAMICS DCP (All versions), SINAMICS G110M V4.7 (Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G120 V4.7 (Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G130 V4.7 (Control Unit) (All versions < V4.7 HF29), SINAMICS G150 (Control Unit) (All versions < V4.8), SINAMICS GH150 V4.7 (Control Unit) (All versions), SINAMICS GL150 V4.7 (Control Unit) (All versions), SINAMICS GM150 V4.7 (Control Unit) (All versions), SINAMICS S110 (Control Unit) (All versions), SINAMICS S120 V4.7 (Control Unit and CBE20) (All versions < V4.7 HF34), SINAMICS S150 (Control Unit) (All versions < V4.8), SINAMICS SL150 V4.7 (Control Unit) (All versions), SINAMICS SM120 V4.7 (Control Unit) (All versions), SINUMERIK 828D (All versions < V4.8 SP5), SINUMERIK 840D sl (All versions). An attacker with network access to an affected product may cause a Denial-of-Service condition by breaking the real-time synchronization (IRT) of the affected installation. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts the availability of the affected installations."
|
||||
"value": "A vulnerability has been identified in CP1604 (All versions < V2.8), CP1616 (All versions < V2.8), Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions < V4.1.1 Patch 05), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions < V4.5.0 Patch 01), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions < V4.5.0), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.2.1), SIMATIC ET200M (incl. SIPLUS variants) (All versions), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0) (All versions), SIMATIC ET200pro (incl. SIPLUS variants) (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) (All versions), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SIMOTION (incl. SIPLUS variants) (All versions), SINAMICS DCM (All versions < V1.5 HF1), SINAMICS DCP (All versions), SINAMICS G110M V4.7 Control Unit (All versions < V4.7 SP10 HF5), SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) (All versions < V4.7 SP10 HF5), SINAMICS G130 V4.7 Control Unit (All versions < V4.7 HF29), SINAMICS G150 Control Unit (All versions < V4.8), SINAMICS GH150 V4.7 Control Unit (All versions), SINAMICS GL150 V4.7 Control Unit (All versions), SINAMICS GM150 V4.7 Control Unit (All versions), SINAMICS S110 Control Unit (All versions), SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) (All versions < V4.7 HF34), SINAMICS S150 Control Unit (All versions < V4.8), SINAMICS SL150 V4.7 Control Unit (All versions < V4.7 HF33), SINAMICS SM120 V4.7 Control Unit (All versions), SINUMERIK 828D (All versions < V4.8 SP5), SINUMERIK 840D sl (All versions). An attacker with network access to an affected product may cause a\nDenial-of-Service condition by breaking the real-time synchronization (IRT)\nof the affected installation.\n\nThe security vulnerability could be exploited by an unauthenticated attacker\nwith network access to the affected installation. No user interaction is\nrequired to exploit this security vulnerability. The vulnerability impacts\nthe availability of the affected installations.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,80 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"ID": "CVE-2019-10934",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-10934",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "TIA Portal V14",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "TIA Portal V15",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "TIA Portal V16",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Upd 4), TIA Portal V16 (All versions). Changing the contents of a configuration file could allow an attacker to\nexecute arbitrary code with SYSTEM privileges.\n\nThe security vulnerability could be exploited by an attacker with a valid\naccount and limited access rights on the system. No user interaction is\nrequired.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known. \n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,7 +55,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200AL",
|
||||
"product_name": "SIMATIC ET200AL (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200M",
|
||||
"product_name": "SIMATIC ET200M (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -75,7 +75,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200MP IM 155-5 PN BA",
|
||||
"product_name": "SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -85,7 +85,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200MP IM 155-5 PN HF",
|
||||
"product_name": "SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200MP IM 155-5 PN ST",
|
||||
"product_name": "SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -105,7 +105,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200S",
|
||||
"product_name": "SIMATIC ET200S (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -115,7 +115,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN BA",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -125,7 +125,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN HA",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -135,7 +135,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN HF",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -145,7 +145,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN HS",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -155,7 +155,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN ST",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -165,7 +165,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN/2 HF",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -175,7 +175,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200SP IM 155-6 PN/3 HF",
|
||||
"product_name": "SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -185,7 +185,17 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0)",
|
||||
"product_name": "SIMATIC ET200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions < V2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -195,7 +205,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200pro",
|
||||
"product_name": "SIMATIC ET200pro (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -205,7 +215,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -215,7 +225,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\"",
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -225,7 +235,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels",
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -235,7 +245,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC PN/PN Coupler",
|
||||
"product_name": "SIMATIC PN/PN Coupler (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -255,17 +265,17 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-1200 CPU family (incl. F)",
|
||||
"product_name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.4.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-1500 CPU family (incl. F)",
|
||||
"product_name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -275,7 +285,17 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-300 CPU family (incl. F)",
|
||||
"product_name": "SIMATIC S7-1500 Software Controller",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions < V2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -285,27 +305,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 (incl. F)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 V6 (incl F) and below",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400H V6",
|
||||
"product_name": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -315,7 +315,27 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-410 V8",
|
||||
"product_name": "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -355,7 +375,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G110M V4.7 (PN Control Unit)",
|
||||
"product_name": "SINAMICS G110M V4.7 PN Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -365,7 +385,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G120 V4.7 (PN Control Unit)",
|
||||
"product_name": "SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -375,7 +395,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -385,7 +405,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -395,7 +415,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GH150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GH150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -405,7 +425,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GL150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GL150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -415,7 +435,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS GM150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS GM150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -425,7 +445,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S110 (Control Unit)",
|
||||
"product_name": "SINAMICS S110 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -435,7 +455,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -445,7 +465,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -455,7 +475,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS SL150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS SL150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -465,7 +485,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS SM120 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS SM120 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -516,16 +536,15 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), SIMATIC CFU PA (All versions < V1.2.0), SIMATIC ET 200AL (All versions), SIMATIC ET 200M (All versions), SIMATIC ET 200MP IM 155-5 PN BA (All versions < V4.3.0), SIMATIC ET 200MP IM 155-5 PN HF (All versions), SIMATIC ET 200MP IM 155-5 PN ST (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200SP IM 155-6 PN BA (All versions), SIMATIC ET 200SP IM 155-6 PN HA (All versions), SIMATIC ET 200SP IM 155-6 PN HF (All versions < V4.2.2), SIMATIC ET 200SP IM 155-6 PN HS (All versions), SIMATIC ET 200SP IM 155-6 PN ST (All versions), SIMATIC ET 200SP IM 155-6 PN/2 HF (All versions < V4.2.2), SIMATIC ET 200SP IM 155-6 PN/3 HF (All versions < V4.2.1), SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0) (All versions), SIMATIC ET 200pro (All versions), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels (All versions), SIMATIC PN/PN Coupler (All versions), SIMATIC PROFINET Driver (All versions < V2.1), SIMATIC S7-1200 CPU family (incl. F) (All versions), SIMATIC S7-1500 CPU family (incl. F) (All versions < V2.0), SIMATIC S7-300 CPU family (incl. F) (All versions), SIMATIC S7-400 PN/DP V7 (incl. F) (All versions), SIMATIC S7-400 V6 (incl F) and below (All versions), SIMATIC S7-400H V6 (All versions < V6.0.9), SIMATIC S7-410 V8 (All versions), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SINAMICS DCM (All versions < V1.5 HF1), SINAMICS DCP (All versions), SINAMICS G110M V4.7 (PN Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G120 V4.7 (PN Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G130 V4.7 (Control Unit) (All versions < 4.8), SINAMICS G150 (Control Unit) (All versions < 4.8), SINAMICS GH150 V4.7 (Control Unit) (All versions), SINAMICS GL150 V4.7 (Control Unit) (All versions), SINAMICS GM150 V4.7 (Control Unit) (All versions), SINAMICS S110 (Control Unit) (All versions), SINAMICS S120 V4.7 (Control Unit) (All versions), SINAMICS S150 (Control Unit) (All versions < 4.8), SINAMICS SL150 V4.7 (Control Unit) (All versions < V4.7 HF33), SINAMICS SM120 V4.7 (Control Unit) (All versions), SINUMERIK 828D (All versions < V4.8 SP5), SINUMERIK 840D sl (All versions). Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of specially crafted UDP packets are sent to device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), SIMATIC CFU PA (All versions < V1.2.0), SIMATIC ET200AL (incl. SIPLUS variants) (All versions), SIMATIC ET200M (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) (All versions < V4.3.0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) (All versions), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) (All versions), SIMATIC ET200S (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) (All versions < V4.2.2), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) (All versions), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) (All versions < V4.2.2), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) (All versions < V4.2.1), SIMATIC ET200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions < V2.0), SIMATIC ET200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0) (All versions), SIMATIC ET200pro (incl. SIPLUS variants) (All versions), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants) (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants) (All versions), SIMATIC HMI KTP Mobile Panels (incl. SIPLUS variants) (All versions), SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) (All versions), SIMATIC PROFINET Driver (All versions < V2.1), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.0), SIMATIC S7-1500 Software Controller (All versions < V2.0), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SINAMICS DCM (All versions < V1.5 HF1), SINAMICS DCP (All versions), SINAMICS G110M V4.7 PN Control Unit (All versions < V4.7 SP10 HF5), SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) (All versions < V4.7 SP10 HF5), SINAMICS G130 V4.7 Control Unit (All versions < 4.8), SINAMICS G150 Control Unit (All versions < 4.8), SINAMICS GH150 V4.7 Control Unit (All versions), SINAMICS GL150 V4.7 Control Unit (All versions), SINAMICS GM150 V4.7 Control Unit (All versions), SINAMICS S110 Control Unit (All versions), SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) (All versions), SINAMICS S150 Control Unit (All versions < 4.8), SINAMICS SL150 V4.7 Control Unit (All versions < V4.7 HF33), SINAMICS SM120 V4.7 Control Unit (All versions), SINUMERIK 828D (All versions < V4.8 SP5), SINUMERIK 840D sl (All versions). Affected devices contain a vulnerability that allows an unauthenticated attacker\nto trigger a denial-of-service condition. The vulnerability can be triggered \nif a large amount of specially crafted UDP packets are sent to device.\n\nThe security vulnerability could be exploited by an attacker with network \naccess to the affected systems. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise availability of the device.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf"
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -15,7 +15,7 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Ethernet plug-in communication modules for SIPROTEC 5 devices with CPU variants CP200",
|
||||
"product_name": "SIPROTEC 5 devices with CPU variants CP200",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -25,11 +25,11 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIPROTEC 5 devices with CPU variants CP300",
|
||||
"product_name": "SIPROTEC 5 devices with CPU variants CP300 and CP100",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V8.01"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -56,16 +56,15 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in Ethernet plug-in communication modules for SIPROTEC 5 devices with CPU variants CP200 (All versions < V7.59), SIPROTEC 5 devices with CPU variants CP300 (All versions). An unauthenticated attacker with network access to the device could potentially insert arbitrary code which is executed before firmware verification in the device. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in SIPROTEC 5 devices with CPU variants CP200 (All versions < V7.59), SIPROTEC 5 devices with CPU variants CP300 and CP100 (All versions < V8.01). An unauthenticated attacker with network access to the device could potentially insert arbitrary code which is executed before firmware verification in the device. \n\nAt the time of advisory publication no public exploitation of this security vulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,60 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"ID": "CVE-2019-10940",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-10940",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SINEMA Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions < V14.0 SP2 Update 1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-266: Incorrect Privilege Assignment"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability has been identified in SINEMA Server (All versions < V14.0 SP2 Update 1). Incorrect session validation could allow an attacker with a valid session, with low privileges,\nto perform firmware updates and other administrative operations on connected devices.\n\nThe security vulnerability could be exploited by an attacker with network access to the\naffected system. An attacker must have access to a low privileged account in order to exploit\nthe vulnerability. An attacker could use the vulnerability to compromise confidentiality,\nintegrity, and availability of the affected system and underlying components.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known. \n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-880233.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -19,7 +19,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < SP3 Update 1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -42,20 +42,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could\nallow an unauthenticated attacker to trigger a denial-of-service\ncondition. The vulnerability can be triggered if a large HTTP request\nis sent to the executing service.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to the affected systems. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise availability of the service provided by the software.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
71
2019/13xxx/CVE-2019-13933.json
Normal file
71
2019/13xxx/CVE-2019-13933.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"ID": "CVE-2019-13933",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SCALANCE X-200RNA switch family",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-306: Missing Authentication for Critical Function"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). Affected devices contain a vulnerability that allows an unauthenticated attacker\nto violate access-control rules. The vulnerability can be triggered\nby sending GET request to specific uniform resource locator on the\nweb configuration interface of the device. \n\nThe security vulnerability could be exploited by an attacker with network\naccess to the affected systems. An attacker could use the vulnerability\nto obtain sensitive information or change the device configuration.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
110
2019/13xxx/CVE-2019-13939.json
Normal file
110
2019/13xxx/CVE-2019-13939.json
Normal file
@ -0,0 +1,110 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"ID": "CVE-2019-13939",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"affects": {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "Nucleus NET",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Nucleus RTOS",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Nucleus ReadyStart for ARM, MIPS, and PPC",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions < V2017.02.2 with patch \"Nucleus 2017.02.02 Nucleus NET Patch\""
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Nucleus SafetyCert",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Nucleus Source Code",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "VSTAR",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
} ]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-840: Business Logic Errors"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus RTOS (All versions), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2017.02.2 with patch \"Nucleus 2017.02.02 Nucleus NET Patch\"), Nucleus SafetyCert (All versions), Nucleus Source Code (All versions), VSTAR (All versions). By sending specially crafted DHCP packets to a device, an attacker may be able to affect availability and integrity of the device. Adjacent network access, but no authentication and no user interaction is needed to conduct this attack.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -86,7 +86,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). An unauthorized user could exploit a buffer overflow vulnerability in the webserver. Specially crafted packets sent could cause a Denial-of-Service condition and if certain conditions are met, the affected devices must be restarted manually to fully recover. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). An unauthorized user could exploit a buffer overflow vulnerability in the webserver. Specially crafted packets sent could cause a Denial-of-Service condition and if certain conditions are met, the affected\ndevices must be restarted manually to fully recover. \n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known. \n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -94,13 +94,7 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,7 +86,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known."
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify\ncontent of particular web pages, causing the application to behave in unexpected ways for legitimate\nusers. Successful exploitation does not require for an attacker to be authenticated to the web interface. \nThis could allow the attacker to read or modify contents of the web application.\n\nAt the time of advisory publication no public exploitation of this security.\nvulnerability was known. \n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -94,13 +94,7 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,7 +86,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). A vulnerability in the integrated web server of the affected devices could allow unauthorized attackers to obtain sensitive information about the device, including logs and configurations. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). A vulnerability in the integrated web server \nof the affected devices could allow unauthorized attackers to obtain sensitive \ninformation about the device, including logs and configurations.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known. \n"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -94,13 +94,7 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-344-07"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,70 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "productcert@siemens.com",
|
||||
"ID": "CVE-2019-19278",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-19278",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Siemens AG",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SINAMICS PERFECT HARMONY GH180 Drives\n\n MLFB 6SR32..-.....-....\n\n MLFB 6SR4...-.....-....\n\n MLFB 6SR5...-.....-....\n\n With option A30 (HMIs 12 inches or larger)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS PERFECT HARMONY GH180 Drives\n\n MLFB 6SR325.-.....-.... (High Availability)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-693: Protection Mechanism Failure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "A vulnerability has been identified in SINAMICS PERFECT HARMONY GH180 Drives\n\n MLFB 6SR32..-.....-....\n\n MLFB 6SR4...-.....-....\n\n MLFB 6SR5...-.....-....\n\n With option A30 (HMIs 12 inches or larger) (All versions), SINAMICS PERFECT HARMONY GH180 Drives\n\n MLFB 6SR325.-.....-.... (High Availability) (All versions). The affected device contains a vulnerability that could allow an unauthenticated attacker to restore\nthe affected device to a point where predefined application and operating system\nprotection mechanisms are not in place.\n\nSuccessful exploitation requires physical access to the system, but no\nsystem privileges and no user interaction. An attacker could use the\nvulnerability to compromise confidentialiy, integrity and availability\nof the device.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-242353.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -15,7 +15,7 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SCALANCE X-200",
|
||||
"product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -25,7 +25,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-200IRT",
|
||||
"product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -35,11 +35,11 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SCALANCE X-300",
|
||||
"product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,20 +72,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 (All Versions < V5.2.4), SCALANCE X-200IRT (All versions), SCALANCE X-300 (All versions), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions < V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker\nmay extract and recover device passwords from the device configuration.\n\nSuccessful exploitation requires access to a device configuration backup and\nimpacts confidentiality of the stored passwords.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -35,7 +35,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC CP343-1 Advanced",
|
||||
"product_name": "CP343-1 Advanced (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -45,7 +45,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC CP443-1",
|
||||
"product_name": "CP443-1 (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -55,7 +55,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC CP443-1 Advanced",
|
||||
"product_name": "CP443-1 Advanced (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC CP443-1 OPC UA",
|
||||
"product_name": "CP443-1 OPC UA (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -75,7 +75,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200 SP Open Controller CPU 1515SP PC",
|
||||
"product_name": "SIMATIC ET 200 SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -85,7 +85,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200 SP Open Controller CPU 1515SP PC2",
|
||||
"product_name": "SIMATIC ET 200 SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -95,31 +95,31 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\"",
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -195,7 +195,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-1500 CPU family",
|
||||
"product_name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -215,7 +215,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-300 CPU family",
|
||||
"product_name": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -225,7 +225,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 PN (incl. F) V6 and below",
|
||||
"product_name": "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -235,7 +235,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 (incl. F)",
|
||||
"product_name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -299,13 +299,13 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMOCODE pro V EIP",
|
||||
"product_name": "SIMOCODE pro V EIP (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -315,7 +315,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMOCODE pro V PN",
|
||||
"product_name": "SIMOCODE pro V PN (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -325,7 +325,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.6 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.6 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -335,7 +335,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -345,7 +345,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.7 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.7 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -355,7 +355,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V4.8 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V4.8 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -365,7 +365,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V5.1 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V5.1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -375,7 +375,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G130 V5.1 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS G130 V5.1 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -385,7 +385,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V4.6 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V4.6 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -395,7 +395,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -405,7 +405,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V4.7 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V4.7 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -415,7 +415,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V4.8 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V4.8 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -425,7 +425,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V5.1 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V5.1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -435,7 +435,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS G150 V5.1 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS G150 V5.1 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -505,7 +505,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.6 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -515,7 +515,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -525,7 +525,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.7 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -535,7 +535,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V4.8 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -545,7 +545,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V5.1 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -555,7 +555,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S120 V5.1 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -565,7 +565,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V4.6 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V4.6 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -575,7 +575,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V4.7 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V4.7 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -585,7 +585,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V4.7 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V4.7 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -595,7 +595,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V4.8 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V4.8 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -605,7 +605,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V5.1 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V5.1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -615,7 +615,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S150 V5.1 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS S150 V5.1 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -625,7 +625,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S210 V5.1 (Control Unit)",
|
||||
"product_name": "SINAMICS S210 V5.1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -635,7 +635,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SINAMICS S210 V5.1 SP1 (Control Unit)",
|
||||
"product_name": "SINAMICS S210 V5.1 SP1 Control Unit",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -699,7 +699,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V1.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -715,17 +715,17 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SITOP UPS1600",
|
||||
"product_name": "SITOP UPS1600 (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V2.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "TIM 1531 IRC",
|
||||
"product_name": "TIM 1531 IRC (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -756,21 +756,19 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in CP1604, CP1616, SIMATIC CP343-1 Advanced, SIMATIC CP443-1, SIMATIC CP443-1 Advanced, SIMATIC CP443-1 OPC UA, SIMATIC ET 200 SP Open Controller CPU 1515SP PC, SIMATIC ET 200 SP Open Controller CPU 1515SP PC2, SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC IPC DiagMonitor, SIMATIC RF181-EIP, SIMATIC RF182C, SIMATIC RF185C, SIMATIC RF186C, SIMATIC RF188C, SIMATIC RF600R, SIMATIC S7-1500 CPU family, SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU family, SIMATIC S7-400 PN (incl. F) V6 and below, SIMATIC S7-400 PN/DP V7 (incl. F), SIMATIC S7-PLCSIM Advanced, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, SIMATIC Teleservice Adapter IE Standard, SIMATIC WinAC RTX (F) 2010, SIMATIC WinCC Runtime Advanced, SIMOCODE pro V EIP, SIMOCODE pro V PN, SINAMICS G130 V4.6 (Control Unit), SINAMICS G130 V4.7 (Control Unit), SINAMICS G130 V4.7 SP1 (Control Unit), SINAMICS G130 V4.8 (Control Unit), SINAMICS G130 V5.1 (Control Unit), SINAMICS G130 V5.1 SP1 (Control Unit), SINAMICS G150 V4.6 (Control Unit), SINAMICS G150 V4.7 (Control Unit), SINAMICS G150 V4.7 SP1 (Control Unit), SINAMICS G150 V4.8 (Control Unit), SINAMICS G150 V5.1 (Control Unit), SINAMICS G150 V5.1 SP1 (Control Unit), SINAMICS GH150 V4.7 (Control Unit), SINAMICS GH150 V4.8 (Control Unit), SINAMICS GL150 V4.7 (Control Unit), SINAMICS GL150 V4.8 (Control Unit), SINAMICS GM150 V4.7 (Control Unit), SINAMICS GM150 V4.8 (Control Unit), SINAMICS S120 V4.6 (Control Unit), SINAMICS S120 V4.7 (Control Unit), SINAMICS S120 V4.7 SP1 (Control Unit), SINAMICS S120 V4.8 (Control Unit), SINAMICS S120 V5.1 (Control Unit), SINAMICS S120 V5.1 SP1 (Control Unit), SINAMICS S150 V4.6 (Control Unit), SINAMICS S150 V4.7 (Control Unit), SINAMICS S150 V4.7 SP1 (Control Unit), SINAMICS S150 V4.8 (Control Unit), SINAMICS S150 V5.1 (Control Unit), SINAMICS S150 V5.1 SP1 (Control Unit), SINAMICS S210 V5.1 (Control Unit), SINAMICS S210 V5.1 SP1 (Control Unit), SINAMICS SL150 V4.7 (Control Unit), SINAMICS SL150 V4.8 (Control Unit), SINAMICS SM120 V4.7 (Control Unit), SINAMICS SM120 V4.8 (Control Unit), SINAMICS SM150 V4.8 (Control Unit), SITOP Manager, SITOP PSU8600, SITOP UPS1600, TIM 1531 IRC. The webserver of the affected devices contains a vulnerability that may lead to a denial-of-service condition. An attacker may cause a denial-of-service situation which leads to a restart of the webserver of the affected device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in CP1604, CP1616, CP343-1 Advanced (incl. SIPLUS NET variants), CP443-1 (incl. SIPLUS NET variants), CP443-1 Advanced (incl. SIPLUS NET variants), CP443-1 OPC UA (incl. SIPLUS NET variants), SIMATIC ET 200 SP Open Controller CPU 1515SP PC (incl. SIPLUS variants), SIMATIC ET 200 SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (incl. SIPLUS variants), SIMATIC IPC DiagMonitor, SIMATIC RF181-EIP, SIMATIC RF182C, SIMATIC RF185C, SIMATIC RF186C, SIMATIC RF188C, SIMATIC RF600R, SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants), SIMATIC S7-PLCSIM Advanced, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, SIMATIC Teleservice Adapter IE Standard, SIMATIC WinAC RTX (F) 2010, SIMATIC WinCC Runtime Advanced, SIMOCODE pro V EIP (incl. SIPLUS variants), SIMOCODE pro V PN (incl. SIPLUS variants), SINAMICS G130 V4.6 Control Unit, SINAMICS G130 V4.7 Control Unit, SINAMICS G130 V4.7 SP1 Control Unit, SINAMICS G130 V4.8 Control Unit, SINAMICS G130 V5.1 Control Unit, SINAMICS G130 V5.1 SP1 Control Unit, SINAMICS G150 V4.6 Control Unit, SINAMICS G150 V4.7 Control Unit, SINAMICS G150 V4.7 SP1 Control Unit, SINAMICS G150 V4.8 Control Unit, SINAMICS G150 V5.1 Control Unit, SINAMICS G150 V5.1 SP1 Control Unit, SINAMICS GH150 V4.7 (Control Unit), SINAMICS GH150 V4.8 (Control Unit), SINAMICS GL150 V4.7 (Control Unit), SINAMICS GL150 V4.8 (Control Unit), SINAMICS GM150 V4.7 (Control Unit), SINAMICS GM150 V4.8 (Control Unit), SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants), SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants), SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants), SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants), SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants), SINAMICS S150 V4.6 Control Unit, SINAMICS S150 V4.7 Control Unit, SINAMICS S150 V4.7 SP1 Control Unit, SINAMICS S150 V4.8 Control Unit, SINAMICS S150 V5.1 Control Unit, SINAMICS S150 V5.1 SP1 Control Unit, SINAMICS S210 V5.1 Control Unit, SINAMICS S210 V5.1 SP1 Control Unit, SINAMICS SL150 V4.7 (Control Unit), SINAMICS SL150 V4.8 (Control Unit), SINAMICS SM120 V4.7 (Control Unit), SINAMICS SM120 V4.8 (Control Unit), SINAMICS SM150 V4.8 (Control Unit), SITOP Manager, SITOP PSU8600, SITOP UPS1600 (incl. SIPLUS variants), TIM 1531 IRC (incl. SIPLUS variants). The webserver of the affected devices contains a vulnerability that may lead to\na denial-of-service condition. An attacker may cause a denial-of-service\nsituation which leads to a restart of the webserver of the affected device.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to the affected systems. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise availability of the device.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf"
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-530931.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-530931.pdf"
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-530931.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -15,31 +15,31 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Scalance X-200",
|
||||
"product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions <V5.2.4"
|
||||
"version_value": "All versions < V5.2.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Scalance X-300",
|
||||
"product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V4.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Scalance XP/XC/XF-200",
|
||||
"product_name": "SCALANCE XP/XC/XF-200 switch family (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions <V4.1"
|
||||
"version_value": "All versions < V4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,20 +62,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in Scalance X-200 (All versions <V5.2.4), Scalance X-300 (All versions), Scalance XP/XC/XF-200 (All versions <V4.1). The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker might use this behaviour to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behaviour. The security vulnerability could be exploited by an attacker with network access to the traffic-receiving network. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the confidentiality and availability of the traffic-generating network. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.4), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3), SCALANCE XP/XC/XF-200 switch family (incl. SIPLUS NET variants) (All versions < V4.1). The monitor barrier of the affected products insufficiently blocks data from being\nforwarded over the mirror port into the mirrored network. An attacker might use\nthis behaviour to transmit malicious packets to systems in the mirrored network, \npossibly influencing their configuration and runtime behaviour. \n\nThe security vulnerability could be exploited by an attacker with network\naccess to the traffic-receiving network. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise the confidentiality and availability of the traffic-generating network.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -5,8 +5,8 @@
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
@ -15,7 +15,7 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "SIMATIC CP443-1 OPC UA",
|
||||
"product_name": "SIMATIC CP443-1 OPC UA (incl. SIPLUS NET variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -25,7 +25,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC ET 200 Open Controller CPU 1515SP PC2",
|
||||
"product_name": "SIMATIC ET 200 Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -35,31 +35,31 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
|
||||
"product_name": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\"",
|
||||
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
|
||||
"product_name": "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (incl. SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -105,7 +105,7 @@
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "SIMATIC S7-1500 CPU family",
|
||||
"product_name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
@ -139,7 +139,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
"version_value": "All versions < V15.1 Upd 4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -202,20 +202,19 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability has been identified in SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 Open Controller CPU 1515SP PC2 (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC NET PC Software (All versions >= V7.1), SIMATIC RF188C (All versions < V1.1.0), SIMATIC RF600R (All versions < V3.2.1), SIMATIC S7-1500 CPU family (All versions >= V2.5 < V2.6.1), SIMATIC S7-1500 Software Controller (All versions between V2.5 (including) and V2.7 (excluding)), SIMATIC WinCC OA (All versions < V3.15-P018), SIMATIC WinCC Runtime Advanced (All versions), SINEC-NMS (All versions), SINEMA Server (All versions < V14 SP2), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions). Specially crafted network packets sent to affected devices on port 4840/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the OPC communication or crash the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
||||
"value": "A vulnerability has been identified in SIMATIC CP443-1 OPC UA (incl. SIPLUS NET variants) (All versions), SIMATIC ET 200 Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Upd 4), SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Upd 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (incl. SIPLUS variants) (All versions < V15.1 Upd 4), SIMATIC IPC DiagMonitor (All versions), SIMATIC NET PC Software (All versions >= V7.1), SIMATIC RF188C (All versions < V1.1.0), SIMATIC RF600R (All versions < V3.2.1), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.5 < V2.6.1), SIMATIC S7-1500 Software Controller (All versions between V2.5 (including) and V2.7 (excluding)), SIMATIC WinCC OA (All versions < V3.15-P018), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Upd 4), SINEC-NMS (All versions), SINEMA Server (All versions < V14 SP2), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions). Specially crafted network packets sent to affected devices on port 4840/tcp\ncould allow an unauthenticated remote attacker to cause a Denial-of-Service\ncondition of the OPC communication or crash the device.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to the affected systems. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise availability of the OPC communication.\n\nAt the time of advisory publication no public exploitation of this security\nvulnerability was known.\n"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user