From 83e5164ee527c7c73a81e896dae5e04a908b78d9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 13 Aug 2024 08:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/35xxx/CVE-2022-35868.json | 19 +- 2022/46xxx/CVE-2022-46143.json | 1046 ++++++++++++++---------------- 2023/26xxx/CVE-2023-26293.json | 27 +- 2023/38xxx/CVE-2023-38527.json | 4 +- 2023/38xxx/CVE-2023-38529.json | 4 +- 2023/38xxx/CVE-2023-38531.json | 4 +- 2023/44xxx/CVE-2023-44317.json | 1104 +------------------------------- 2023/44xxx/CVE-2023-44318.json | 204 +----- 2023/44xxx/CVE-2023-44319.json | 1104 +------------------------------- 2023/44xxx/CVE-2023-44320.json | 1017 ++--------------------------- 2023/44xxx/CVE-2023-44321.json | 263 ++++---- 2023/44xxx/CVE-2023-44322.json | 936 +-------------------------- 2023/44xxx/CVE-2023-44373.json | 1104 +------------------------------- 2023/44xxx/CVE-2023-44374.json | 1042 +----------------------------- 2023/46xxx/CVE-2023-46280.json | 382 +---------- 2023/46xxx/CVE-2023-46281.json | 4 +- 2023/46xxx/CVE-2023-46282.json | 4 +- 2023/46xxx/CVE-2023-46283.json | 4 +- 2023/46xxx/CVE-2023-46284.json | 4 +- 2023/46xxx/CVE-2023-46285.json | 4 +- 2023/49xxx/CVE-2023-49691.json | 276 +------- 2023/49xxx/CVE-2023-49692.json | 108 +--- 2024/26xxx/CVE-2024-26275.json | 4 +- 2024/26xxx/CVE-2024-26276.json | 4 +- 2024/26xxx/CVE-2024-26277.json | 4 +- 2024/32xxx/CVE-2024-32635.json | 31 +- 2024/32xxx/CVE-2024-32636.json | 31 +- 2024/32xxx/CVE-2024-32637.json | 31 +- 2024/36xxx/CVE-2024-36398.json | 65 +- 2024/38xxx/CVE-2024-38867.json | 2 +- 2024/38xxx/CVE-2024-38876.json | 50 +- 2024/38xxx/CVE-2024-38877.json | 42 +- 2024/38xxx/CVE-2024-38878.json | 28 +- 2024/38xxx/CVE-2024-38879.json | 28 +- 2024/39xxx/CVE-2024-39922.json | 245 ++++++- 2024/41xxx/CVE-2024-41681.json | 65 +- 2024/41xxx/CVE-2024-41682.json | 65 +- 2024/41xxx/CVE-2024-41683.json | 65 +- 2024/41xxx/CVE-2024-41903.json | 65 +- 2024/41xxx/CVE-2024-41904.json | 65 +- 2024/41xxx/CVE-2024-41905.json | 65 +- 2024/41xxx/CVE-2024-41906.json | 65 +- 2024/41xxx/CVE-2024-41907.json | 65 +- 2024/41xxx/CVE-2024-41908.json | 65 +- 2024/41xxx/CVE-2024-41938.json | 65 +- 2024/41xxx/CVE-2024-41939.json | 65 +- 2024/41xxx/CVE-2024-41940.json | 65 +- 2024/41xxx/CVE-2024-41941.json | 65 +- 2024/41xxx/CVE-2024-41976.json | 341 +++++++++- 2024/41xxx/CVE-2024-41977.json | 341 +++++++++- 2024/41xxx/CVE-2024-41978.json | 341 +++++++++- 2024/43xxx/CVE-2024-43425.json | 18 + 2024/43xxx/CVE-2024-43426.json | 18 + 2024/43xxx/CVE-2024-43427.json | 18 + 2024/43xxx/CVE-2024-43428.json | 18 + 2024/43xxx/CVE-2024-43429.json | 18 + 2024/43xxx/CVE-2024-43430.json | 18 + 2024/43xxx/CVE-2024-43431.json | 18 + 2024/43xxx/CVE-2024-43432.json | 18 + 2024/43xxx/CVE-2024-43433.json | 18 + 2024/43xxx/CVE-2024-43434.json | 18 + 2024/43xxx/CVE-2024-43435.json | 18 + 2024/43xxx/CVE-2024-43436.json | 18 + 2024/43xxx/CVE-2024-43437.json | 18 + 2024/43xxx/CVE-2024-43438.json | 18 + 2024/43xxx/CVE-2024-43439.json | 18 + 2024/43xxx/CVE-2024-43440.json | 18 + 2024/43xxx/CVE-2024-43441.json | 18 + 68 files changed, 3406 insertions(+), 7997 deletions(-) create mode 100644 2024/43xxx/CVE-2024-43425.json create mode 100644 2024/43xxx/CVE-2024-43426.json create mode 100644 2024/43xxx/CVE-2024-43427.json create mode 100644 2024/43xxx/CVE-2024-43428.json create mode 100644 2024/43xxx/CVE-2024-43429.json create mode 100644 2024/43xxx/CVE-2024-43430.json create mode 100644 2024/43xxx/CVE-2024-43431.json create mode 100644 2024/43xxx/CVE-2024-43432.json create mode 100644 2024/43xxx/CVE-2024-43433.json create mode 100644 2024/43xxx/CVE-2024-43434.json create mode 100644 2024/43xxx/CVE-2024-43435.json create mode 100644 2024/43xxx/CVE-2024-43436.json create mode 100644 2024/43xxx/CVE-2024-43437.json create mode 100644 2024/43xxx/CVE-2024-43438.json create mode 100644 2024/43xxx/CVE-2024-43439.json create mode 100644 2024/43xxx/CVE-2024-43440.json create mode 100644 2024/43xxx/CVE-2024-43441.json diff --git a/2022/35xxx/CVE-2022-35868.json b/2022/35xxx/CVE-2022-35868.json index 6b4245a24de..ede3924d22e 100644 --- a/2022/35xxx/CVE-2022-35868.json +++ b/2022/35xxx/CVE-2022-35868.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in TIA Multiuser Server V14 (All versions), TIA Multiuser Server V15 (All versions < V15.1 Update 8), TIA Project-Server\u00a0 (All versions < V1.1), TIA Project-Server V16 (All versions), TIA Project-Server V17 (All versions < V17 Update 6). Affected applications contain an untrusted search path vulnerability that could allow an attacker to escalate privileges, when tricking a legitimate user to start the service from an attacker controlled path." + "value": "A vulnerability has been identified in TIA Multiuser Server V14 (All versions), TIA Multiuser Server V15 (All versions < V15.1 Update 8), TIA Project-Server (All versions < V1.1), TIA Project-Server V16 (All versions), TIA Project-Server V17 (All versions < V17 Update 6). Affected applications contain an untrusted search path vulnerability that could allow an attacker to escalate privileges, when tricking a legitimate user to start the service from an attacker controlled path." } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -58,7 +59,7 @@ } }, { - "product_name": "TIA Project-Server\u00a0", + "product_name": "TIA Project-Server", "version": { "version_data": [ { @@ -73,8 +74,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -102,6 +104,11 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-640968.pdf", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-640968.pdf" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-640968.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-640968.html" } ] }, diff --git a/2022/46xxx/CVE-2022-46143.json b/2022/46xxx/CVE-2022-46143.json index e61eb9d7cb1..4169e29fa60 100644 --- a/2022/46xxx/CVE-2022-46143.json +++ b/2022/46xxx/CVE-2022-46143.json @@ -40,12 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -55,12 +52,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -70,72 +64,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -145,12 +100,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -160,12 +112,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -175,27 +124,21 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -205,12 +148,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -220,12 +160,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -235,12 +172,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -250,12 +184,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -265,12 +196,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -280,12 +208,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -295,42 +220,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V7.2" - }, - { - "version_affected": "=", - "version_value": "All versions < V8.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2" } ] } @@ -340,12 +256,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -355,12 +273,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -370,12 +290,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -385,12 +307,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -400,12 +324,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -415,12 +341,14 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.3" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.3" }, { - "version_affected": "=", - "version_value": "All versions >= V2.3 < V3.0" + "version_affected": "<", + "version_name": "V2.3", + "version_value": "V3.0" } ] } @@ -430,12 +358,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -445,8 +370,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -456,8 +382,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -467,8 +394,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -478,8 +406,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -489,12 +418,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -504,16 +430,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -523,16 +442,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -542,8 +454,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -553,12 +466,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -568,12 +478,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -583,12 +490,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -598,12 +502,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -613,12 +514,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -628,20 +526,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -651,8 +538,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -662,12 +550,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -677,8 +562,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -688,8 +574,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -699,12 +586,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -714,16 +598,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -733,12 +610,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -748,12 +622,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -763,12 +634,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -778,12 +646,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -793,12 +658,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -808,16 +670,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -827,16 +682,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" - }, - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -846,8 +694,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -857,8 +706,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -868,8 +718,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -879,8 +730,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -890,8 +742,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -901,12 +754,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" - }, - { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -916,8 +766,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -927,8 +778,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V2.0" + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" } ] } @@ -938,8 +790,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -949,12 +802,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" - }, - { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -964,8 +814,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -975,8 +826,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -986,8 +838,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -997,8 +850,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1008,8 +862,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1019,8 +874,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1030,8 +886,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1041,8 +898,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1052,8 +910,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1063,8 +922,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1074,8 +934,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1085,8 +946,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1096,8 +958,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1107,8 +970,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1118,8 +982,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1129,8 +994,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1140,8 +1006,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1151,8 +1018,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1162,8 +1030,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1173,8 +1042,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1184,8 +1054,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1195,8 +1066,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1206,8 +1078,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1217,8 +1090,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1228,8 +1102,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1239,8 +1114,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1250,8 +1126,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1261,8 +1138,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1272,8 +1150,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1283,8 +1162,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1294,8 +1174,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1305,8 +1186,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1316,8 +1198,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1327,8 +1210,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1338,8 +1222,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1349,8 +1234,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1360,8 +1246,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1371,8 +1258,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1382,8 +1270,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1393,8 +1282,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1404,8 +1294,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1415,8 +1306,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1426,8 +1318,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1437,8 +1330,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1448,8 +1342,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1459,8 +1354,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1470,8 +1366,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1481,8 +1378,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1492,8 +1390,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1503,8 +1402,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1514,8 +1414,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1525,8 +1426,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1536,8 +1438,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1547,8 +1450,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1558,8 +1462,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1569,8 +1474,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1580,8 +1486,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1591,8 +1498,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1602,8 +1510,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1613,8 +1522,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1624,8 +1534,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1635,8 +1546,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1646,8 +1558,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1657,8 +1570,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1668,8 +1582,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1679,8 +1594,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1690,12 +1606,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" - }, - { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1705,8 +1618,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1716,8 +1630,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1727,8 +1642,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1738,8 +1654,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1749,8 +1666,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1760,8 +1678,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1771,8 +1690,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1782,8 +1702,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1793,8 +1714,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1804,8 +1726,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1815,8 +1738,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1826,8 +1750,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1837,8 +1762,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1848,8 +1774,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1859,8 +1786,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1870,8 +1798,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1881,8 +1810,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1892,8 +1822,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1903,8 +1834,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1914,8 +1846,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1925,12 +1858,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V6.6" - }, - { - "version_affected": "=", - "version_value": "All versions < V6.6" + "version_affected": "<", + "version_name": "0", + "version_value": "V6.6" } ] } @@ -1940,8 +1870,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1951,8 +1882,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1962,8 +1894,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1973,8 +1906,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V4.4" + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" } ] } @@ -1996,6 +1930,16 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" } ] }, diff --git a/2023/26xxx/CVE-2023-26293.json b/2023/26xxx/CVE-2023-26293.json index 338334be052..9f35921dd6f 100644 --- a/2023/26xxx/CVE-2023-26293.json +++ b/2023/26xxx/CVE-2023-26293.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 6), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 1). Affected products contain a path traversal vulnerability that could allow the creation or overwrite of arbitrary files in the engineering system. If the user is tricked to open a malicious PC system configuration file, an attacker could exploit this vulnerability to achieve arbitrary code execution." + "value": "A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions < V16 Update 7), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 6), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 1). Affected products contain a path traversal vulnerability that could allow the creation or overwrite of arbitrary files in the engineering system. If the user is tricked to open a malicious PC system configuration file, an attacker could exploit this vulnerability to achieve arbitrary code execution." } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "*" } ] } @@ -51,8 +52,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V16 Update 7" } ] } @@ -62,8 +64,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V17 Update 6" + "version_affected": "<", + "version_name": "0", + "version_value": "V17 Update 6" } ] } @@ -73,8 +76,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions < V18 Update 1" + "version_affected": "<", + "version_name": "0", + "version_value": "V18 Update 1" } ] } @@ -91,6 +95,11 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-116924.pdf", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-116924.pdf" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-116924.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-116924.html" } ] }, diff --git a/2023/38xxx/CVE-2023-38527.json b/2023/38xxx/CVE-2023-38527.json index db9c072296e..a0a70c3dba3 100644 --- a/2023/38xxx/CVE-2023-38527.json +++ b/2023/38xxx/CVE-2023-38527.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -78,7 +78,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2023/38xxx/CVE-2023-38529.json b/2023/38xxx/CVE-2023-38529.json index 1a35e6b596a..5503496c296 100644 --- a/2023/38xxx/CVE-2023-38529.json +++ b/2023/38xxx/CVE-2023-38529.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2023/38xxx/CVE-2023-38531.json b/2023/38xxx/CVE-2023-38531.json index 3d8cdeef9bc..6683180ff8d 100644 --- a/2023/38xxx/CVE-2023-38531.json +++ b/2023/38xxx/CVE-2023-38531.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2023/44xxx/CVE-2023-44317.json b/2023/44xxx/CVE-2023-44317.json index 387e3e02559..09836f24b7b 100644 --- a/2023/44xxx/CVE-2023-44317.json +++ b/2023/44xxx/CVE-2023-44317.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V7.2.2" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V7.2.2" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,1074 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } } ] } diff --git a/2023/44xxx/CVE-2023-44318.json b/2023/44xxx/CVE-2023-44318.json index bc7829ac833..828ee9b3dd1 100644 --- a/2023/44xxx/CVE-2023-44318.json +++ b/2023/44xxx/CVE-2023-44318.json @@ -69,9 +69,13 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ + { + "version_affected": "=", + "version_value": "All versions" + }, { "version_affected": "=", "version_value": "All versions" @@ -80,31 +84,13 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { "version_affected": "=", "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ + }, { "version_affected": "=", "version_value": "All versions" @@ -146,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -234,7 +220,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -245,7 +231,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -255,174 +241,6 @@ ] } }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, { "product_name": "SCALANCE XB205-3 (SC, PN)", "version": { @@ -1290,7 +1108,7 @@ "cvss": [ { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "baseScore": 4.9, "baseSeverity": "MEDIUM" } diff --git a/2023/44xxx/CVE-2023-44319.json b/2023/44xxx/CVE-2023-44319.json index 98c61e86fbb..8739592a22d 100644 --- a/2023/44xxx/CVE-2023-44319.json +++ b/2023/44xxx/CVE-2023-44319.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,1074 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } } ] } diff --git a/2023/44xxx/CVE-2023-44320.json b/2023/44xxx/CVE-2023-44320.json index ef8d78af592..8afc8b0b341 100644 --- a/2023/44xxx/CVE-2023-44320.json +++ b/2023/44xxx/CVE-2023-44320.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator." } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -51,8 +52,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -62,52 +64,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -117,8 +100,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -128,8 +112,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -139,19 +124,21 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -161,8 +148,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -172,8 +160,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -183,8 +172,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -194,8 +184,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -205,8 +196,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } @@ -216,941 +208,45 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V7.2.2" } ] } }, { "product_name": "SCALANCE MUM856-1 (RoW)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE S615", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE S615 EEC", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V4.5" + "version_value": "V7.2.2" } ] } }, { - "product_name": "SIPLUS NET SCALANCE XC208", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V4.5" + "version_value": "V7.2.2" } ] } }, { - "product_name": "SIPLUS NET SCALANCE XC216-4C", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V4.5" + "version_value": "V7.2.2" } ] } @@ -1187,6 +283,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" } ] }, diff --git a/2023/44xxx/CVE-2023-44321.json b/2023/44xxx/CVE-2023-44321.json index ed37bcbcf75..1581e2f168f 100644 --- a/2023/44xxx/CVE-2023-44321.json +++ b/2023/44xxx/CVE-2023-44321.json @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -51,8 +52,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -62,52 +64,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router family", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router family", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -117,8 +100,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -128,8 +112,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -139,19 +124,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M874-3 3G-Router (CN)", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -161,8 +160,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -172,8 +172,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -183,8 +184,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -194,8 +196,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -205,8 +232,45 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -216,8 +280,9 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } @@ -227,102 +292,33 @@ "version": { "version_data": [ { - "version_affected": "=", - "version_value": "All versions" + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" } ] } }, { - "product_name": "SCALANCE S615", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE S615 EEC", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SCALANCE SC622-2C", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V8.1" } ] } }, { - "product_name": "SCALANCE SC626-2C", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" + "version_value": "V8.1" } ] } @@ -1192,6 +1188,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" } ] }, diff --git a/2023/44xxx/CVE-2023-44322.json b/2023/44xxx/CVE-2023-44322.json index be5079b8f6d..b3183a40b1b 100644 --- a/2023/44xxx/CVE-2023-44322.json +++ b/2023/44xxx/CVE-2023-44322.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,906 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.1" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } } ] } diff --git a/2023/44xxx/CVE-2023-44373.json b/2023/44xxx/CVE-2023-44373.json index 7b82e25df46..40dfe2a4340 100644 --- a/2023/44xxx/CVE-2023-44373.json +++ b/2023/44xxx/CVE-2023-44373.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,1074 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } } ] } diff --git a/2023/44xxx/CVE-2023-44374.json b/2023/44xxx/CVE-2023-44374.json index 2d8c8d46ddf..2bdc7e30964 100644 --- a/2023/44xxx/CVE-2023-44374.json +++ b/2023/44xxx/CVE-2023-44374.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -155,18 +131,6 @@ ] } }, - { - "product_name": "SCALANCE M876-3 (EVDO)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, { "product_name": "SCALANCE M876-3 (ROK)", "version": { @@ -252,7 +216,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,1002 +238,6 @@ } ] } - }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB205-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB208 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3 (ST, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB213-3LD (SC, PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (E/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XB216 (PN)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (SC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2 (ST/BFOC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2G PoE EEC (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G (EIP DEF.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC206-2SFP G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G (EIP def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC208G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-3G PoE (54 V DC)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G (EIP Def.)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XC224-4C G EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204 DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XF204-2BA DNA", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP208PoE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216 (Ethernet/IP)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XP216POE EEC", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR326-2C PoE WG (without UL)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC206-2SFP", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC208", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } - }, - { - "product_name": "SIPLUS NET SCALANCE XC216-4C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V4.5" - } - ] - } } ] } diff --git a/2023/46xxx/CVE-2023-46280.json b/2023/46xxx/CVE-2023-46280.json index edefe69369b..e0000cb5d2d 100644 --- a/2023/46xxx/CVE-2023-46280.json +++ b/2023/46xxx/CVE-2023-46280.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in S7-PCT (All versions), Security Configuration Tool (SCT) (All versions), SIMATIC Automation Tool (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V16 (All versions), SIMATIC NET PC Software V17 (All versions), SIMATIC NET PC Software V18 (All versions < V18 SP1), SIMATIC PCS 7 V9.1 (All versions), SIMATIC PDM V9.2 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC STEP 7 V5 (All versions), SIMATIC WinCC OA V3.17 (All versions), SIMATIC WinCC OA V3.18 (All versions < V3.18 P025), SIMATIC WinCC OA V3.19 (All versions < V3.19 P010), SIMATIC WinCC Runtime Advanced (All versions), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 6), SIMATIC WinCC Runtime Professional V17 (All versions), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC Unified PC Runtime (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 17), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5), SINAMICS Startdrive (All versions < V19 SP1), SINUMERIK ONE virtual (All versions < V6.23), SINUMERIK PLC Programming Tool (All versions), TIA Portal Cloud Connector (All versions < V2.0), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 4), Totally Integrated Automation Portal (TIA Portal) V19 (All versions < V19 Update 2). The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel." } ] }, @@ -36,384 +36,13 @@ "product": { "product_data": [ { - "product_name": "S7-PCT", + "product_name": "SINEC NMS", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "Security Configuration Tool (SCT)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC Automation Tool", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "All versions" - } - ] - } - }, - { - "product_name": "SIMATIC BATCH V9.1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC NET PC Software V16", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC NET PC Software V17", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC NET PC Software V18", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V18 SP1" - } - ] - } - }, - { - "product_name": "SIMATIC PCS 7 V9.1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC PDM V9.2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC Route Control V9.1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC STEP 7 V5", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC OA V3.17", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC OA V3.18", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.18 P025" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC OA V3.19", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.19 P010" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Runtime Advanced", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Runtime Professional V16", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V16 Update 6" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Runtime Professional V17", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Runtime Professional V18", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V18 Update 4" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Runtime Professional V19", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V19 Update 2" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC Unified PC Runtime", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC V7.4", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC V7.5", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V7.5 SP2 Update 17" - } - ] - } - }, - { - "product_name": "SIMATIC WinCC V8.0", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0 Update 5" - } - ] - } - }, - { - "product_name": "SINAMICS Startdrive", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V19 SP1" - } - ] - } - }, - { - "product_name": "SINUMERIK ONE virtual", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V6.23" - } - ] - } - }, - { - "product_name": "SINUMERIK PLC Programming Tool", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "TIA Portal Cloud Connector", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V2.0" - } - ] - } - }, - { - "product_name": "Totally Integrated Automation Portal (TIA Portal) V15.1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "Totally Integrated Automation Portal (TIA Portal) V16", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "Totally Integrated Automation Portal (TIA Portal) V17", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "Totally Integrated Automation Portal (TIA Portal) V18", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V18 Update 4" - } - ] - } - }, - { - "product_name": "Totally Integrated Automation Portal (TIA Portal) V19", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V19 Update 2" + "version_value": "V3.0" } ] } @@ -430,6 +59,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-962515.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-962515.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" } ] }, diff --git a/2023/46xxx/CVE-2023-46281.json b/2023/46xxx/CVE-2023-46281.json index 3f13de6f5dc..9d3b20e1f6c 100644 --- a/2023/46xxx/CVE-2023-46281.json +++ b/2023/46xxx/CVE-2023-46281.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior." + "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior." } ] }, @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "V17 Update 7" + "version_value": "*" } ] } diff --git a/2023/46xxx/CVE-2023-46282.json b/2023/46xxx/CVE-2023-46282.json index cf27f7331fa..bd18bdc68e7 100644 --- a/2023/46xxx/CVE-2023-46282.json +++ b/2023/46xxx/CVE-2023-46282.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected applications that could allow an attacker to inject arbitrary JavaScript code. The code could be potentially executed later by another (possibly privileged) user." + "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected applications that could allow an attacker to inject arbitrary JavaScript code. The code could be potentially executed later by another (possibly privileged) user." } ] }, @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "V17 Update 7" + "version_value": "*" } ] } diff --git a/2023/46xxx/CVE-2023-46283.json b/2023/46xxx/CVE-2023-46283.json index 8e89b8fdf2a..c10236a4ce2 100644 --- a/2023/46xxx/CVE-2023-46283.json +++ b/2023/46xxx/CVE-2023-46283.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." + "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." } ] }, @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "V17 Update 7" + "version_value": "*" } ] } diff --git a/2023/46xxx/CVE-2023-46284.json b/2023/46xxx/CVE-2023-46284.json index f9d8c4dc2d0..a025b9a638c 100644 --- a/2023/46xxx/CVE-2023-46284.json +++ b/2023/46xxx/CVE-2023-46284.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp and 4004/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." + "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp and 4004/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash." } ] }, @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "V17 Update 7" + "version_value": "*" } ] } diff --git a/2023/46xxx/CVE-2023-46285.json b/2023/46xxx/CVE-2023-46285.json index b2aba11afd0..d4340bac6bc 100644 --- a/2023/46xxx/CVE-2023-46285.json +++ b/2023/46xxx/CVE-2023-46285.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an improper input validation vulnerability that could allow an attacker to bring the service into a Denial-of-Service state by sending a specifically crafted message to 4004/tcp. The corresponding service is auto-restarted after the crash is detected by a watchdog." + "value": "A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an improper input validation vulnerability that could allow an attacker to bring the service into a Denial-of-Service state by sending a specifically crafted message to 4004/tcp. The corresponding service is auto-restarted after the crash is detected by a watchdog." } ] }, @@ -114,7 +114,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "V17 Update 7" + "version_value": "*" } ] } diff --git a/2023/49xxx/CVE-2023-49691.json b/2023/49xxx/CVE-2023-49691.json index be3e7e636a8..a843ecc969b 100644 --- a/2023/49xxx/CVE-2023-49691.json +++ b/2023/49xxx/CVE-2023-49691.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V8.0" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,246 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WAM766-1 EEC (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM763-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (EU)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (ME)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } - }, - { - "product_name": "SCALANCE WUM766-1 (US)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "*" - } - ] - } } ] } diff --git a/2023/49xxx/CVE-2023-49692.json b/2023/49xxx/CVE-2023-49692.json index 4b571e9511e..b7d954d1cc4 100644 --- a/2023/49xxx/CVE-2023-49692.json +++ b/2023/49xxx/CVE-2023-49692.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V7.2.2), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established." } ] }, @@ -72,7 +72,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex A)", + "product_name": "SCALANCE M812-1 ADSL-Router", "version": { "version_data": [ { @@ -84,31 +84,7 @@ } }, { - "product_name": "SCALANCE M812-1 ADSL-Router (Annex B)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V7.2.2" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex A)", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V7.2.2" - } - ] - } - }, - { - "product_name": "SCALANCE M816-1 ADSL-Router (Annex B)", + "product_name": "SCALANCE M816-1 ADSL-Router", "version": { "version_data": [ { @@ -156,7 +132,7 @@ } }, { - "product_name": "SCALANCE M876-3 (EVDO)", + "product_name": "SCALANCE M876-3", "version": { "version_data": [ { @@ -252,7 +228,7 @@ } }, { - "product_name": "SCALANCE S615", + "product_name": "SCALANCE S615 EEC LAN-Router", "version": { "version_data": [ { @@ -264,7 +240,7 @@ } }, { - "product_name": "SCALANCE S615 EEC", + "product_name": "SCALANCE S615 LAN-Router", "version": { "version_data": [ { @@ -274,78 +250,6 @@ } ] } - }, - { - "product_name": "SCALANCE SC622-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC626-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC632-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC636-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC642-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } - }, - { - "product_name": "SCALANCE SC646-2C", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "0", - "version_value": "V3.0.2" - } - ] - } } ] } diff --git a/2024/26xxx/CVE-2024-26275.json b/2024/26xxx/CVE-2024-26275.json index 80b84f34cfc..6457e65a9cf 100644 --- a/2024/26xxx/CVE-2024-26275.json +++ b/2024/26xxx/CVE-2024-26275.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2024/26xxx/CVE-2024-26276.json b/2024/26xxx/CVE-2024-26276.json index f4c1b7996ee..076ec909ff4 100644 --- a/2024/26xxx/CVE-2024-26276.json +++ b/2024/26xxx/CVE-2024-26276.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition." } ] }, @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2024/26xxx/CVE-2024-26277.json b/2024/26xxx/CVE-2024-26277.json index b055c517944..e672e09388e 100644 --- a/2024/26xxx/CVE-2024-26277.json +++ b/2024/26xxx/CVE-2024-26277.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition." } ] }, @@ -90,7 +90,7 @@ { "version_affected": "<", "version_name": "0", - "version_value": "*" + "version_value": "V14.2.0.12" } ] } diff --git a/2024/32xxx/CVE-2024-32635.json b/2024/32xxx/CVE-2024-32635.json index c64c3519639..603e46d9dc9 100644 --- a/2024/32xxx/CVE-2024-32635.json +++ b/2024/32xxx/CVE-2024-32635.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V35.1 (All versions < V35.1.256), Parasolid V36.0 (All versions < V36.0.208), Parasolid V36.1 (All versions < V36.1.173). The affected applications contain an out of bounds read past the unmapped memory region while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain an out of bounds read past the unmapped memory region while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -36,37 +36,49 @@ "product": { "product_data": [ { - "product_name": "Parasolid V35.1", + "product_name": "JT2Go", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V35.1.256" + "version_value": "V2312.0005" } ] } }, { - "product_name": "Parasolid V36.0", + "product_name": "Teamcenter Visualization V14.2", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.0.208" + "version_value": "V14.2.0.12" } ] } }, { - "product_name": "Parasolid V36.1", + "product_name": "Teamcenter Visualization V14.3", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.1.173" + "version_value": "V14.3.0.10" + } + ] + } + }, + { + "product_name": "Teamcenter Visualization V2312", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2312.0005" } ] } @@ -83,6 +95,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html" } ] }, diff --git a/2024/32xxx/CVE-2024-32636.json b/2024/32xxx/CVE-2024-32636.json index ce1f33bc5e8..f9aad6ac76b 100644 --- a/2024/32xxx/CVE-2024-32636.json +++ b/2024/32xxx/CVE-2024-32636.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V35.1 (All versions < V35.1.256), Parasolid V36.0 (All versions < V36.0.208), Parasolid V36.1 (All versions < V36.1.173). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." } ] }, @@ -36,37 +36,49 @@ "product": { "product_data": [ { - "product_name": "Parasolid V35.1", + "product_name": "JT2Go", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V35.1.256" + "version_value": "V2312.0005" } ] } }, { - "product_name": "Parasolid V36.0", + "product_name": "Teamcenter Visualization V14.2", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.0.208" + "version_value": "V14.2.0.12" } ] } }, { - "product_name": "Parasolid V36.1", + "product_name": "Teamcenter Visualization V14.3", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.1.173" + "version_value": "V14.3.0.10" + } + ] + } + }, + { + "product_name": "Teamcenter Visualization V2312", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2312.0005" } ] } @@ -83,6 +95,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html" } ] }, diff --git a/2024/32xxx/CVE-2024-32637.json b/2024/32xxx/CVE-2024-32637.json index 24fccd70328..d6c26eb6d82 100644 --- a/2024/32xxx/CVE-2024-32637.json +++ b/2024/32xxx/CVE-2024-32637.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Parasolid V35.1 (All versions < V35.1.256), Parasolid V36.0 (All versions < V36.0.208), Parasolid V36.1 (All versions < V36.1.173). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition." + "value": "A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition." } ] }, @@ -36,37 +36,49 @@ "product": { "product_data": [ { - "product_name": "Parasolid V35.1", + "product_name": "JT2Go", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V35.1.256" + "version_value": "V2312.0005" } ] } }, { - "product_name": "Parasolid V36.0", + "product_name": "Teamcenter Visualization V14.2", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.0.208" + "version_value": "V14.2.0.12" } ] } }, { - "product_name": "Parasolid V36.1", + "product_name": "Teamcenter Visualization V14.3", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", - "version_value": "V36.1.173" + "version_value": "V14.3.0.10" + } + ] + } + }, + { + "product_name": "Teamcenter Visualization V2312", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2312.0005" } ] } @@ -83,6 +95,11 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html", "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/html/ssa-046364.html" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html" } ] }, diff --git a/2024/36xxx/CVE-2024-36398.json b/2024/36xxx/CVE-2024-36398.json index 6e805c2d0be..be31bf0293a 100644 --- a/2024/36xxx/CVE-2024-36398.json +++ b/2024/36xxx/CVE-2024-36398.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application executes a subset of its services as `NT AUTHORITY\\SYSTEM`. This could allow a local attacker to execute operating system commands with elevated privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250: Execution with Unnecessary Privileges", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC NMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 7.8, + "baseSeverity": "HIGH" } ] } diff --git a/2024/38xxx/CVE-2024-38867.json b/2024/38xxx/CVE-2024-38867.json index fce80e43f5f..22a4c1d0703 100644 --- a/2024/38xxx/CVE-2024-38867.json +++ b/2024/38xxx/CVE-2024-38867.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). \r\nThis could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over to and from those ports." + "value": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). \r\nThis could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports." } ] }, diff --git a/2024/38xxx/CVE-2024-38876.json b/2024/38xxx/CVE-2024-38876.json index 5d5e124e085..0243f1be103 100644 --- a/2024/38xxx/CVE-2024-38876.json +++ b/2024/38xxx/CVE-2024-38876.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions >= R9.2), Omnivise T3000 Domain Controller (All versions >= R9.2), Omnivise T3000 Product Data Management (PDM) (All versions >= R9.2), Omnivise\u00a0T3000 Terminal Server (All versions >= R9.2), Omnivise T3000 Thin Client (All versions >= R9.2), Omnivise T3000 Whitelisting Server (All versions >= R9.2). The affected application regularly executes user modifiable code as a privileged user. This could allow a local authenticated attacker to execute arbitrary code with elevated privileges." + "value": "A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). The affected application regularly executes user modifiable code as a privileged user. This could allow a local authenticated attacker to execute arbitrary code with elevated privileges." } ] }, @@ -36,72 +36,96 @@ "product": { "product_data": [ { - "product_name": "Omnivise\u00a0T3000 Application Server", + "product_name": "Omnivise T3000 Application Server R9.2", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", "version_value": "*" } ] } }, { - "product_name": "Omnivise T3000 Domain Controller", + "product_name": "Omnivise T3000 Domain Controller R9.2", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", "version_value": "*" } ] } }, { - "product_name": "Omnivise T3000 Product Data Management (PDM)", + "product_name": "Omnivise T3000 Product Data Management (PDM) R9.2", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", "version_value": "*" } ] } }, { - "product_name": "Omnivise\u00a0T3000 Terminal Server", + "product_name": "Omnivise T3000 R8.2 SP3", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", "version_value": "*" } ] } }, { - "product_name": "Omnivise T3000 Thin Client", + "product_name": "Omnivise T3000 R8.2 SP4", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", "version_value": "*" } ] } }, { - "product_name": "Omnivise T3000 Whitelisting Server", + "product_name": "Omnivise T3000 Terminal Server R9.2", "version": { "version_data": [ { "version_affected": "<", - "version_name": "R9.2", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 Thin Client R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 Whitelisting Server R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", "version_value": "*" } ] diff --git a/2024/38xxx/CVE-2024-38877.json b/2024/38xxx/CVE-2024-38877.json index 4a70db05c76..c2b3dd713bb 100644 --- a/2024/38xxx/CVE-2024-38877.json +++ b/2024/38xxx/CVE-2024-38877.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions), Omnivise T3000 Domain Controller (All versions), Omnivise T3000 Network Intrusion Detection System (NIDS) (All versions), Omnivise T3000 Product Data Management (PDM) (All versions), Omnivise T3000 Security Server (All versions), Omnivise\u00a0T3000 Terminal Server (All versions), Omnivise T3000 Thin Client (All versions), Omnivise T3000 Whitelisting Server (All versions). The affected devices stores initial system credentials without sufficient protection. An attacker with remote shell access or physical access could retrieve the credentials leading to confidentiality loss allowing the attacker to laterally move within the affected network." + "value": "A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Security Server R9.2 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). The affected devices stores initial system credentials without sufficient protection. An attacker with remote shell access or physical access could retrieve the credentials leading to confidentiality loss allowing the attacker to laterally move within the affected network." } ] }, @@ -36,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Omnivise\u00a0T3000 Application Server", + "product_name": "Omnivise T3000 Application Server R9.2", "version": { "version_data": [ { @@ -48,7 +48,7 @@ } }, { - "product_name": "Omnivise T3000 Domain Controller", + "product_name": "Omnivise T3000 Domain Controller R9.2", "version": { "version_data": [ { @@ -60,7 +60,7 @@ } }, { - "product_name": "Omnivise T3000 Network Intrusion Detection System (NIDS)", + "product_name": "Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2", "version": { "version_data": [ { @@ -72,7 +72,7 @@ } }, { - "product_name": "Omnivise T3000 Product Data Management (PDM)", + "product_name": "Omnivise T3000 Product Data Management (PDM) R9.2", "version": { "version_data": [ { @@ -84,7 +84,7 @@ } }, { - "product_name": "Omnivise T3000 Security Server", + "product_name": "Omnivise T3000 R8.2 SP3", "version": { "version_data": [ { @@ -96,7 +96,7 @@ } }, { - "product_name": "Omnivise\u00a0T3000 Terminal Server", + "product_name": "Omnivise T3000 R8.2 SP4", "version": { "version_data": [ { @@ -108,7 +108,7 @@ } }, { - "product_name": "Omnivise T3000 Thin Client", + "product_name": "Omnivise T3000 Security Server R9.2", "version": { "version_data": [ { @@ -120,7 +120,31 @@ } }, { - "product_name": "Omnivise T3000 Whitelisting Server", + "product_name": "Omnivise T3000 Terminal Server R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 Thin Client R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 Whitelisting Server R9.2", "version": { "version_data": [ { diff --git a/2024/38xxx/CVE-2024-38878.json b/2024/38xxx/CVE-2024-38878.json index 60a94dede26..49f2582b9c4 100644 --- a/2024/38xxx/CVE-2024-38878.json +++ b/2024/38xxx/CVE-2024-38878.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions). Affected devices allow authenticated users to export diagnostics data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download arbitrary files from the file system." + "value": "A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions). Affected devices allow authenticated users to export diagnostics data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download arbitrary files from the file system." } ] }, @@ -36,7 +36,31 @@ "product": { "product_data": [ { - "product_name": "Omnivise\u00a0T3000 Application Server", + "product_name": "Omnivise T3000 Application Server R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 R8.2 SP3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 R8.2 SP4", "version": { "version_data": [ { diff --git a/2024/38xxx/CVE-2024-38879.json b/2024/38xxx/CVE-2024-38879.json index a69ec71ea19..d6e838cec49 100644 --- a/2024/38xxx/CVE-2024-38879.json +++ b/2024/38xxx/CVE-2024-38879.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability has been identified in Omnivise\u00a0T3000 Application Server (All versions). The affected system exposes the port of an internal application on the public network interface allowing an attacker to circumvent authentication and directly access the exposed application." + "value": "A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions). The affected system exposes the port of an internal application on the public network interface allowing an attacker to circumvent authentication and directly access the exposed application." } ] }, @@ -36,7 +36,31 @@ "product": { "product_data": [ { - "product_name": "Omnivise\u00a0T3000 Application Server", + "product_name": "Omnivise T3000 Application Server R9.2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 R8.2 SP3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "Omnivise T3000 R8.2 SP4", "version": { "version_data": [ { diff --git a/2024/39xxx/CVE-2024-39922.json b/2024/39xxx/CVE-2024-39922.json index 132f1789cfb..684150f7b05 100644 --- a/2024/39xxx/CVE-2024-39922.json +++ b/2024/39xxx/CVE-2024-39922.json @@ -1,17 +1,254 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-39922", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions). Affected devices store user passwords in plaintext without proper protection. This could allow a physical attacker to retrieve them from the embedded storage ICs." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Plaintext Storage of a Password", + "cweId": "CWE-256" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "LOGO! 12/24RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 12/24RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 230RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 230RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 24CE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 24CEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 24RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "LOGO! 24RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 12/24RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 12/24RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 230RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 230RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 24CE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 24CEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 24RCE", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + }, + { + "product_name": "SIPLUS LOGO! 24RCEo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "*" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-921449.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-921449.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41681.json b/2024/41xxx/CVE-2024-41681.json index d852ce1438a..e2dfbbd2cc8 100644 --- a/2024/41xxx/CVE-2024-41681.json +++ b/2024/41xxx/CVE-2024-41681.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41681", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Location Intelligence family (All versions < V4.4). The web server of affected products is configured to support weak ciphers by default. This could allow an unauthenticated attacker in an on-path position to to read and modify any data passed over the connection between legitimate clients and the affected device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-326: Inadequate Encryption Strength", + "cweId": "CWE-326" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Location Intelligence family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41682.json b/2024/41xxx/CVE-2024-41682.json index 149b224c212..beda7294ab0 100644 --- a/2024/41xxx/CVE-2024-41682.json +++ b/2024/41xxx/CVE-2024-41682.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41682", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated remote attacker to conduct brute force attacks against legitimate user passwords." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-307: Improper Restriction of Excessive Authentication Attempts", + "cweId": "CWE-307" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Location Intelligence family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41683.json b/2024/41xxx/CVE-2024-41683.json index 14b87c398c8..91fa8279486 100644 --- a/2024/41xxx/CVE-2024-41683.json +++ b/2024/41xxx/CVE-2024-41683.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41683", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce a strong user password policy. This could facilitate a brute force attack against legitimate user passwords." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-521: Weak Password Requirements", + "cweId": "CWE-521" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "Location Intelligence family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41903.json b/2024/41xxx/CVE-2024-41903.json index 3dd831b8e79..a964ecfb1ee 100644 --- a/2024/41xxx/CVE-2024-41903.json +++ b/2024/41xxx/CVE-2024-41903.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41903", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application mounts the container's root filesystem with read and write privileges. This could allow an attacker to alter the container's filesystem leading to unauthorized modifications and data corruption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-269: Improper Privilege Management", + "cweId": "CWE-269" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC Traffic Analyzer", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41904.json b/2024/41xxx/CVE-2024-41904.json index 09e1bc75166..7afa46c4ed7 100644 --- a/2024/41xxx/CVE-2024-41904.json +++ b/2024/41xxx/CVE-2024-41904.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41904", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated attacker to conduct brute force attacks against legitimate user credentials or keys." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-307: Improper Restriction of Excessive Authentication Attempts", + "cweId": "CWE-307" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC Traffic Analyzer", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2024/41xxx/CVE-2024-41905.json b/2024/41xxx/CVE-2024-41905.json index da63c323f82..4166677d940 100644 --- a/2024/41xxx/CVE-2024-41905.json +++ b/2024/41xxx/CVE-2024-41905.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41905", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application do not have access control for accessing the files. This could allow an authenticated attacker with low privilege's to get access to sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC Traffic Analyzer", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41906.json b/2024/41xxx/CVE-2024-41906.json index 8254f8f5719..a0bbafe17dd 100644 --- a/2024/41xxx/CVE-2024-41906.json +++ b/2024/41xxx/CVE-2024-41906.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41906", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application does not properly handle cacheable HTTP responses in the web service. This could allow an attacker to read and modify data stored in the local cache." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-524: Use of Cache Containing Sensitive Information", + "cweId": "CWE-524" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC Traffic Analyzer", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41907.json b/2024/41xxx/CVE-2024-41907.json index 5cd4da95f62..3eebb5dd43c 100644 --- a/2024/41xxx/CVE-2024-41907.json +++ b/2024/41xxx/CVE-2024-41907.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41907", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application is missing general HTTP security headers in the web server. This could allow an attacker to make the servers more prone to clickjacking attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-358: Improperly Implemented Security Check for Standard", + "cweId": "CWE-358" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC Traffic Analyzer", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41908.json b/2024/41xxx/CVE-2024-41908.json index c1e82c9645c..dcba96158b3 100644 --- a/2024/41xxx/CVE-2024-41908.json +++ b/2024/41xxx/CVE-2024-41908.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41908", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in NX (All versions < V2406.3000). The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "NX", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V2406.3000" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-357412.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-357412.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH" } ] } diff --git a/2024/41xxx/CVE-2024-41938.json b/2024/41xxx/CVE-2024-41938.json index dfc0229ffa6..e0fb16c541c 100644 --- a/2024/41xxx/CVE-2024-41938.json +++ b/2024/41xxx/CVE-2024-41938.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41938", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The importCertificate function of the SINEC NMS Control web application contains a path traversal vulnerability. This could allow an authenticated attacker it to delete arbitrary certificate files on the drive SINEC NMS is installed on." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC NMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L/E:P/RL:O/RC:C", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41939.json b/2024/41xxx/CVE-2024-41939.json index 2401b0f79bc..debf815236a 100644 --- a/2024/41xxx/CVE-2024-41939.json +++ b/2024/41xxx/CVE-2024-41939.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41939", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly enforce authorization checks. This could allow an authenticated attacker to bypass the checks and elevate their privileges on the application." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC NMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 8.8, + "baseSeverity": "HIGH" } ] } diff --git a/2024/41xxx/CVE-2024-41940.json b/2024/41xxx/CVE-2024-41940.json index 74f77e5e103..c6e6a288e44 100644 --- a/2024/41xxx/CVE-2024-41940.json +++ b/2024/41xxx/CVE-2024-41940.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41940", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly validate user input to a privileged command queue. This could allow an authenticated attacker to execute OS commands with elevated privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC NMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" } ] } diff --git a/2024/41xxx/CVE-2024-41941.json b/2024/41xxx/CVE-2024-41941.json index 33f2a2e024f..6f522703d0c 100644 --- a/2024/41xxx/CVE-2024-41941.json +++ b/2024/41xxx/CVE-2024-41941.json @@ -1,17 +1,74 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41941", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly enforce authorization checks. This could allow an authenticated attacker to bypass the checks and modify settings in the application without authorization." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863: Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "SINEC NMS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/41xxx/CVE-2024-41976.json b/2024/41xxx/CVE-2024-41976.json index 2ec3c7f60b8..5ccd78fdd90 100644 --- a/2024/41xxx/CVE-2024-41976.json +++ b/2024/41xxx/CVE-2024-41976.json @@ -1,17 +1,350 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41976", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly validate input in specific VPN configuration fields. This could allow an authenticated remote attacker to execute arbitrary code on the device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) EU", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) NAM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M804PB", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M812-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M816-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M826-2 SHDSL-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3 3G-Router (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3 (ROK)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (NAM)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (RoW)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 EEC LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:T/RC:C", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2024/41xxx/CVE-2024-41977.json b/2024/41xxx/CVE-2024-41977.json index c943e15df3c..ec585e00493 100644 --- a/2024/41xxx/CVE-2024-41977.json +++ b/2024/41xxx/CVE-2024-41977.json @@ -1,17 +1,350 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41977", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-488: Exposure of Data Element to Wrong Session", + "cweId": "CWE-488" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) EU", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) NAM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M804PB", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M812-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M816-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M826-2 SHDSL-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3 3G-Router (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3 (ROK)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (NAM)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (RoW)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 EEC LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", + "baseScore": 7.1, + "baseSeverity": "HIGH" } ] } diff --git a/2024/41xxx/CVE-2024-41978.json b/2024/41xxx/CVE-2024-41978.json index 32e7906f2ec..91aeb2cfc03 100644 --- a/2024/41xxx/CVE-2024-41978.json +++ b/2024/41xxx/CVE-2024-41978.json @@ -1,17 +1,350 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-41978", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "productcert@siemens.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532: Insertion of Sensitive Information into Log File", + "cweId": "CWE-532" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Siemens", + "product": { + "product_data": [ + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) EU", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "RUGGEDCOM RM1224 LTE(4G) NAM", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M804PB", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M812-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M816-1 ADSL-Router family", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M826-2 SHDSL-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M874-3 3G-Router (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-3 (ROK)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE M876-4 (NAM)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM853-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (A1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (B1)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (CN)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (EU)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE MUM856-1 (RoW)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 EEC LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + }, + { + "product_name": "SCALANCE S615 LAN-Router", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "V8.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html", + "refsource": "MISC", + "name": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/43xxx/CVE-2024-43425.json b/2024/43xxx/CVE-2024-43425.json new file mode 100644 index 00000000000..2e98f01c385 --- /dev/null +++ b/2024/43xxx/CVE-2024-43425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43426.json b/2024/43xxx/CVE-2024-43426.json new file mode 100644 index 00000000000..52d4c4cf7f5 --- /dev/null +++ b/2024/43xxx/CVE-2024-43426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43427.json b/2024/43xxx/CVE-2024-43427.json new file mode 100644 index 00000000000..419085c5cc2 --- /dev/null +++ b/2024/43xxx/CVE-2024-43427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43428.json b/2024/43xxx/CVE-2024-43428.json new file mode 100644 index 00000000000..e26e62d9ff9 --- /dev/null +++ b/2024/43xxx/CVE-2024-43428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43429.json b/2024/43xxx/CVE-2024-43429.json new file mode 100644 index 00000000000..e8c2c2da97e --- /dev/null +++ b/2024/43xxx/CVE-2024-43429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43430.json b/2024/43xxx/CVE-2024-43430.json new file mode 100644 index 00000000000..1acbba164d2 --- /dev/null +++ b/2024/43xxx/CVE-2024-43430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43431.json b/2024/43xxx/CVE-2024-43431.json new file mode 100644 index 00000000000..1f66f3a6a1c --- /dev/null +++ b/2024/43xxx/CVE-2024-43431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43432.json b/2024/43xxx/CVE-2024-43432.json new file mode 100644 index 00000000000..41aa2fc6401 --- /dev/null +++ b/2024/43xxx/CVE-2024-43432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43433.json b/2024/43xxx/CVE-2024-43433.json new file mode 100644 index 00000000000..807b975ffe3 --- /dev/null +++ b/2024/43xxx/CVE-2024-43433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43434.json b/2024/43xxx/CVE-2024-43434.json new file mode 100644 index 00000000000..8cdca33036b --- /dev/null +++ b/2024/43xxx/CVE-2024-43434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43435.json b/2024/43xxx/CVE-2024-43435.json new file mode 100644 index 00000000000..4f16b238c42 --- /dev/null +++ b/2024/43xxx/CVE-2024-43435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43436.json b/2024/43xxx/CVE-2024-43436.json new file mode 100644 index 00000000000..a11b9ce201b --- /dev/null +++ b/2024/43xxx/CVE-2024-43436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43437.json b/2024/43xxx/CVE-2024-43437.json new file mode 100644 index 00000000000..678c91b3ed7 --- /dev/null +++ b/2024/43xxx/CVE-2024-43437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43438.json b/2024/43xxx/CVE-2024-43438.json new file mode 100644 index 00000000000..2d66f4c44d8 --- /dev/null +++ b/2024/43xxx/CVE-2024-43438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43439.json b/2024/43xxx/CVE-2024-43439.json new file mode 100644 index 00000000000..4836939dcfa --- /dev/null +++ b/2024/43xxx/CVE-2024-43439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43440.json b/2024/43xxx/CVE-2024-43440.json new file mode 100644 index 00000000000..6dbda605b00 --- /dev/null +++ b/2024/43xxx/CVE-2024-43440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/43xxx/CVE-2024-43441.json b/2024/43xxx/CVE-2024-43441.json new file mode 100644 index 00000000000..67b026524d4 --- /dev/null +++ b/2024/43xxx/CVE-2024-43441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-43441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file