mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
202 lines
9.1 KiB
JSON
202 lines
9.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "productcert@siemens.com",
|
|
"ID": "CVE-2018-4839",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Siemens",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "DIGSI 4",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.92"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "EN100 Ethernet module DNP3 variant",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V1.05.00"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "EN100 Ethernet module IEC 104 variant",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "EN100 Ethernet module IEC 61850 variant",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.30"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "EN100 Ethernet module Modbus TCP variant",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "EN100 Ethernet module PROFINET IO variant",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Other SIPROTEC 4 relays",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Other SIPROTEC Compact relays",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC 4 7SD80",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.70"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC 4 7SJ61",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.96"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC 4 7SJ62",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.96"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC 4 7SJ64",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.96"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC 4 7SJ66",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.30"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC Compact 7SJ80",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.77"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "SIPROTEC Compact 7SK80",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions < V4.77"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-326: Inadequate Encryption Strength"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability has been identified in DIGSI 4 (All versions < V4.92), EN100 Ethernet module DNP3 variant (All versions < V1.05.00), EN100 Ethernet module IEC 104 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.30), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions), Other SIPROTEC 4 relays (All versions), Other SIPROTEC Compact relays (All versions), SIPROTEC 4 7SD80 (All versions < V4.70), SIPROTEC 4 7SJ61 (All versions < V4.96), SIPROTEC 4 7SJ62 (All versions < V4.96), SIPROTEC 4 7SJ64 (All versions < V4.96), SIPROTEC 4 7SJ66 (All versions < V4.30), SIPROTEC Compact 7SJ80 (All versions < V4.77), SIPROTEC Compact 7SK80 (All versions < V4.77). An attacker with local access to the engineering system or in a privileged network position and able to obtain certain network traffic could possibly reconstruct access authorization passwords."
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-203306.pdf",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-203306.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |