Siemens AD-2022-03

This commit is contained in:
Siemens ProductCERT 2022-03-08 12:29:13 +01:00
parent 914dfe3690
commit c72fd80f73
34 changed files with 2783 additions and 177 deletions

View File

@ -86,7 +86,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure."
"value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure."
}
]
},

View File

@ -34,16 +34,6 @@
]
}
},
{
"product_name": "Nucleus ReadyStart V3",
"version": {
"version_data": [
{
"version_value": "All versions < V2017.02.4"
}
]
}
},
{
"product_name": "Nucleus ReadyStart V4",
"version": {
@ -73,6 +63,16 @@
}
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions >= V0.5.0.0 < V1.0.0.0"
}
]
}
}
]
}
@ -96,7 +96,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving."
"value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving."
}
]
},

View File

@ -284,6 +284,26 @@
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V0.5.0.0"
}
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V1.0.0.0"
}
]
}
},
{
"product_name": "TALON TC Compact (BACnet)",
"version": {
@ -326,7 +346,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)"
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)"
}
]
},
@ -351,6 +371,10 @@
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"
},
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"
}
]
}

View File

@ -284,6 +284,26 @@
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V0.5.0.0"
}
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V1.0.0.0"
}
]
}
},
{
"product_name": "TALON TC Compact (BACnet)",
"version": {
@ -326,7 +346,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)"
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)"
}
]
},
@ -351,6 +371,10 @@
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"
},
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"
}
]
}

View File

@ -274,6 +274,16 @@
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V0.5.0.0"
}
]
}
},
{
"product_name": "TALON TC Compact (BACnet)",
"version": {
@ -316,7 +326,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)"
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)"
}
]
},
@ -341,6 +351,10 @@
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"
},
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"
}
]
}

View File

@ -284,6 +284,26 @@
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V0.5.0.0"
}
]
}
},
{
"product_name": "SIMOTICS CONNECT 400",
"version": {
"version_data": [
{
"version_value": "All versions < V1.0.0.0"
}
]
}
},
{
"product_name": "TALON TC Compact (BACnet)",
"version": {
@ -326,7 +346,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)"
"value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3), Desigo PXC00-U (All versions >= V2.3), Desigo PXC001-E.D (All versions >= V2.3), Desigo PXC100-E.D (All versions >= V2.3), Desigo PXC12-E.D (All versions >= V2.3), Desigo PXC128-U (All versions >= V2.3), Desigo PXC200-E.D (All versions >= V2.3), Desigo PXC22-E.D (All versions >= V2.3), Desigo PXC22.1-E.D (All versions >= V2.3), Desigo PXC36.1-E.D (All versions >= V2.3), Desigo PXC50-E.D (All versions >= V2.3), Desigo PXC64-U (All versions >= V2.3), Desigo PXM20-E (All versions >= V2.3), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)"
}
]
},
@ -351,6 +371,10 @@
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"
},
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"
}
]
}

View File

@ -69,7 +69,7 @@
"version": {
"version_data": [
{
"version_value": "All versions"
"version_value": "All versions < V4.0 SP1"
}
]
}
@ -106,7 +106,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations."
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations."
}
]
},

View File

@ -69,7 +69,7 @@
"version": {
"version_data": [
{
"version_value": "All versions"
"version_value": "All versions < V4.0 SP1"
}
]
}
@ -106,7 +106,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations."
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations."
}
]
},

View File

@ -69,7 +69,7 @@
"version": {
"version_data": [
{
"version_value": "All versions"
"version_value": "All versions < V4.0 SP1"
}
]
}
@ -106,7 +106,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations."
"value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations."
}
]
},

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-37208",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37208",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). Improper neutralization of special characters on the web server configuration page could allow an attacker, in a privileged position, to retrieve sensitive information via cross-site scripting."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -1,17 +1,650 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-37209",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-37209",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS M2200",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS M969",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC20",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC30",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC40",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC41",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RP110",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS400",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS401",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS8000",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS8000A",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS8000H",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS8000T",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900 (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900GP",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900L",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900L",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900W",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS910L",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS910W",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS920L",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS920W",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS930L",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS930W",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS940G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS969",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2200",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900R",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG907R",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG908C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG909R",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG910C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS i800",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS i801",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS i802",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS i803",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-311: Missing Encryption of Sensitive Data"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS M2200 (All versions < V5.6.0), RUGGEDCOM ROS M969 (All versions < V5.6.0), RUGGEDCOM ROS RMC (All versions < V5.6.0), RUGGEDCOM ROS RMC20 (All versions < V5.6.0), RUGGEDCOM ROS RMC30 (All versions < V5.6.0), RUGGEDCOM ROS RMC40 (All versions < V5.6.0), RUGGEDCOM ROS RMC41 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 (All versions < V5.6.0), RUGGEDCOM ROS RP110 (All versions < V5.6.0), RUGGEDCOM ROS RS400 (All versions < V5.6.0), RUGGEDCOM ROS RS401 (All versions < V5.6.0), RUGGEDCOM ROS RS416 (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS8000 (All versions < V5.6.0), RUGGEDCOM ROS RS8000A (All versions < V5.6.0), RUGGEDCOM ROS RS8000H (All versions < V5.6.0), RUGGEDCOM ROS RS8000T (All versions < V5.6.0), RUGGEDCOM ROS RS900 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RS900GP (All versions < V5.6.0), RUGGEDCOM ROS RS900L (All versions < V5.6.0), RUGGEDCOM ROS RS900L (All versions < V5.6.0), RUGGEDCOM ROS RS900W (All versions < V5.6.0), RUGGEDCOM ROS RS910 (All versions < V5.6.0), RUGGEDCOM ROS RS910L (All versions < V5.6.0), RUGGEDCOM ROS RS910W (All versions < V5.6.0), RUGGEDCOM ROS RS920L (All versions < V5.6.0), RUGGEDCOM ROS RS920W (All versions < V5.6.0), RUGGEDCOM ROS RS930L (All versions < V5.6.0), RUGGEDCOM ROS RS930W (All versions < V5.6.0), RUGGEDCOM ROS RS940G (All versions < V5.6.0), RUGGEDCOM ROS RS969 (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2200 (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 (All versions < V5.6.0), RUGGEDCOM ROS RSG900 (All versions < V5.6.0), RUGGEDCOM ROS RSG900C (All versions < V5.6.0), RUGGEDCOM ROS RSG900G (All versions < V5.6.0), RUGGEDCOM ROS RSG900R (All versions < V5.6.0), RUGGEDCOM ROS RSG907R (All versions < V5.6.0), RUGGEDCOM ROS RSG908C (All versions < V5.6.0), RUGGEDCOM ROS RSG909R (All versions < V5.6.0), RUGGEDCOM ROS RSG910C (All versions < V5.6.0), RUGGEDCOM ROS RSG920P (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0), RUGGEDCOM ROS i800 (All versions < V5.6.0), RUGGEDCOM ROS i801 (All versions < V5.6.0), RUGGEDCOM ROS i802 (All versions < V5.6.0), RUGGEDCOM ROS i803 (All versions < V5.6.0). Unencrypted storage of passwords in the client configuration files and during\nnetwork transmission could allow an attacker in a privileged position to\nobtain access passwords."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf"
}
]
}

View File

@ -116,7 +116,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files."
"value": "A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files."
}
]
},

View File

@ -14,6 +14,16 @@
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Climatix POL909 (AWB module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.42"
}
]
}
},
{
"product_name": "Climatix POL909 (AWM module)",
"version": {
@ -46,7 +56,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit."
"value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.42), Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit."
}
]
},

View File

@ -1,17 +1,70 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-41541",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41541",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Climatix POL909 (AWB module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.44"
}
]
}
},
{
"product_name": "Climatix POL909 (AWM module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.36"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The Group Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-252466.pdf"
}
]
}

View File

@ -1,17 +1,70 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-41542",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41542",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Climatix POL909 (AWB module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.44"
}
]
}
},
{
"product_name": "Climatix POL909 (AWM module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.36"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The User Management page of affected devices is vulnerable to cross-site scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-252466.pdf"
}
]
}

View File

@ -1,17 +1,70 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-41543",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-41543",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Climatix POL909 (AWB module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.44"
}
]
}
},
{
"product_name": "Climatix POL909 (AWM module)",
"version": {
"version_data": [
{
"version_value": "All versions < V11.36"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.44), Climatix POL909 (AWM module) (All versions < V11.36). The handling of log files in the web application of affected devices contains an information disclosure vulnerability which could allow logged in users to access sensitive files."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-252466.pdf"
}
]
}

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-42016",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42016",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-208: Observable Timing Discrepancy"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). A timing attack in a third-party component could make the retrieval of the private key possible, used for encryption of sensitive data. If a threat actor were to exploit this, the data integrity and security could be compromised."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-42017",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42017",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-358: Improperly Implemented Security Check for Standard"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). A new variant of the POODLE attack has left a third-party component vulnerable due to the implementation flaws of the CBC encryption mode in TLS 1.0 to 1.2. If an attacker were to exploit this, they could act as a man-in-the-middle and eavesdrop on encrypted communications."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-42018",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42018",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122: Heap-based Buffer Overflow"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). Within a third-party component, whenever memory allocation is requested, the out of bound size is not checked. Therefore, if size exceeding the expected allocation is assigned, it could allocate a smaller buffer instead. If an attacker were to exploit this, they could cause a heap overflow."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-42019",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42019",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-190: Integer Overflow or Wraparound"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). Within a third-party component, the process to allocate partition size fails to check memory boundaries. Therefore, if a large amount is requested by an attacker, due to an integer-wrap around, it could result in a small size being allocated instead."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -1,17 +1,230 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-42020",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-42020",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM ROS M2100",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RMC8388 devices",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS416v2",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RS900G (32M)",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2100P (32M) V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2288 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2300P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG2488 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG900 V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSG920P V5.X",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RSL910",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST2228",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916C",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
},
{
"product_name": "RUGGEDCOM ROS RST916P",
"version": {
"version_data": [
{
"version_value": "All versions < V5.6.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-754: Improper Check for Unusual or Exceptional Conditions"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). The third-party component in its TFTP functionality fails to check for null terminations in file names. If an attacker were to exploit this, it could result in data corruption, and possibly a hard-fault of the application."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf"
}
]
}

View File

@ -44,16 +44,6 @@
]
}
},
{
"product_name": "Teamcenter Visualization V12.4",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
},
{
"product_name": "Teamcenter Visualization V13.1",
"version": {
@ -106,7 +96,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V12.4 (All versions), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15053)"
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15053)"
}
]
},

View File

@ -44,16 +44,6 @@
]
}
},
{
"product_name": "Teamcenter Visualization V12.4",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
},
{
"product_name": "Teamcenter Visualization V13.1",
"version": {
@ -106,7 +96,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V12.4 (All versions), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110)"
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110)"
}
]
},

View File

@ -44,16 +44,6 @@
]
}
},
{
"product_name": "Teamcenter Visualization V12.4",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
},
{
"product_name": "Teamcenter Visualization V13.1",
"version": {
@ -106,7 +96,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V12.4 (All versions), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15112)"
"value": "A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15112)"
}
]
},

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-44478",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-44478",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Polarion Subversion Webclient",
"version": {
"version_data": [
{
"version_value": "V21 R1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Polarion Subversion Webclient (V21 R1). A cross-site scripting is present due to improper neutralization of data sent to the web page through the SVN WebClient in the affected product.\n\nAn attacker could exploit this to execute arbitrary code and extract sensitive information by sending a specially crafted link to users with administrator privileges."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-562051.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24281",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24281",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINEC NMS",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in SINEC NMS (All versions). A privileged authenticated attacker could execute arbitrary commands in the local database by sending specially crafted requests to the webserver of the affected application."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24282",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24282",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINEC NMS",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502: Deserialization of Untrusted Data"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in SINEC NMS (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf"
}
]
}

View File

@ -1,17 +1,80 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24309",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24309",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Mendix Applications using Mendix 7",
"version": {
"version_data": [
{
"version_value": "All versions < V7.23.29"
}
]
}
},
{
"product_name": "Mendix Applications using Mendix 8",
"version": {
"version_data": [
{
"version_value": "All versions < V8.18.16"
}
]
}
},
{
"product_name": "Mendix Applications using Mendix 9",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29), Mendix Applications using Mendix 8 (All versions < V8.18.16), Mendix Applications using Mendix 9 (All versions). If an entity has an association readable by the user, then in some cases, Mendix Runtime may not apply checks for XPath constraints that parse said associations, within apps running on affected versions. A malicious user could use this to dump and manipulate sensitive data."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-148641.pdf"
}
]
}

View File

@ -1,17 +1,70 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24408",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24408",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINUMERIK MC",
"version": {
"version_data": [
{
"version_value": "All versions < V1.15 SP1"
}
]
}
},
{
"product_name": "SINUMERIK ONE",
"version": {
"version_data": [
{
"version_value": "All versions < V6.15 SP1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269: Improper Privilege Management"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in SINUMERIK MC (All versions < V1.15 SP1), SINUMERIK ONE (All versions < V6.15 SP1). The sc SUID binary on affected devices provides several commands that are used to execute system commands or modify system files.\n\nA specific set of operations using sc could allow local attackers to escalate their privileges to root."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-337210.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-24661",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-24661",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Simcenter STAR-CCM+ Viewer",
"version": {
"version_data": [
{
"version_value": "All versions < V2022.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2022.1). The starview+.exe contains a memory corruption vulnerability while parsing\nspecially crafted .SCE files. This could allow an attacker to execute code in the context of the current process."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-166747.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-25311",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-25311",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINEC NMS",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269: Improper Privilege Management"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in SINEC NMS (All versions). The affected software do not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low privileged user to achieve privilege escalation."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-250085.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-26313",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26313",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Mendix Forgot Password Appstore module",
"version": {
"version_data": [
{
"version_value": "All versions >= V3.3.0 < V3.5.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Mendix Forgot Password Appstore module (All versions >= V3.3.0 < V3.5.1). In certain configurations of the affected product, a threat actor could use the sign up flow to hijack arbitrary user accounts."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134279.pdf"
}
]
}

View File

@ -1,17 +1,70 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-26314",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26314",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Mendix Forgot Password Appstore module",
"version": {
"version_data": [
{
"version_value": "All versions >= V3.3.0 < V3.5.1"
}
]
}
},
{
"product_name": "Mendix Forgot Password Appstore module (Mendix 7 compatible)",
"version": {
"version_data": [
{
"version_value": "All versions < V3.2.2"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-307: Improper Restriction of Excessive Authentication Attempts"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Mendix Forgot Password Appstore module (All versions >= V3.3.0 < V3.5.1), Mendix Forgot Password Appstore module (Mendix 7 compatible) (All versions < V3.2.2). Initial passwords are generated in an insecure manner. This could allow an unauthenticated remote attacker to efficiently brute force passwords in specific situations."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134279.pdf"
}
]
}

View File

@ -1,17 +1,60 @@
{
"data_type": "CVE",
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2022-26317",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-26317",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Mendix Applications using Mendix 7",
"version": {
"version_data": [
{
"version_value": "All versions < V7.23.29"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.29). When returning the result of a completed Microflow execution call the affected framework does not correctly verify, if the request was initially made by the user requesting the result. Together with predictable identifiers for Microflow execution calls, this could allow a malicious attacker to retrieve information about arbitrary Microflow execution calls made by users within the affected system."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-415938.pdf"
}
]
}