mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
69 lines
2.2 KiB
JSON
69 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "productcert@siemens.com",
|
|
"DATE_PUBLIC" : "2018-03-27T00:00:00",
|
|
"ID" : "CVE-2018-4841",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "TIM 1531 IRC",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "All versions < V1.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Siemens AG"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "CWE-303: Incorrect Implementation of Authentication Algorithm"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf"
|
|
},
|
|
{
|
|
"name" : "103576",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/103576"
|
|
}
|
|
]
|
|
}
|
|
}
|