From c093e910acbd585a4c91ee7da078dce8243d05af Mon Sep 17 00:00:00 2001 From: Siemens ProductCERT Date: Fri, 2 Aug 2019 14:59:36 +0200 Subject: [PATCH] Updated CVE-2019-10938 Signed-off-by: Siemens ProductCERT --- 2019/10xxx/CVE-2019-10938.json | 66 ++++++++++++++++++++++++++++++---- 1 file changed, 59 insertions(+), 7 deletions(-) diff --git a/2019/10xxx/CVE-2019-10938.json b/2019/10xxx/CVE-2019-10938.json index fb0374f14de..8029098923c 100644 --- a/2019/10xxx/CVE-2019-10938.json +++ b/2019/10xxx/CVE-2019-10938.json @@ -1,18 +1,70 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10938", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "affects": { + "vendor" : { + "vendor_data" : [ + { + "vendor_name": "Siemens AG", + "product" : { + "product_data" : [ + { + "product_name": "Ethernet plug-in communication modules for SIPROTEC 5 devices with CPU variants CP200", + "version" : { + "version_data" : [ + { + "version_value" : "All versions" + } + ] + } + }, + { + "product_name": "SIPROTEC 5 devices with CPU variants CP300", + "version" : { + "version_data" : [ + { + "version_value" : "All versions" + } + ] + } + } ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been identified in Ethernet plug-in communication modules for SIPROTEC 5 devices with CPU variants CP200 (All versions), SIPROTEC 5 devices with CPU variants CP300 (All versions). An unauthenticated attacker with network access to the device could potentially insert arbitrary code which is executed before firmware verification in the device.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known." } ] } -} \ No newline at end of file +}