mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
85 lines
4.3 KiB
JSON
85 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "productcert@siemens.com",
|
|
"ID": "CVE-2018-13814",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC WinCC Runtime Advanced : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC WinCC Runtime Professional : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC WinCC (TIA Portal) : All versions < V14"
|
|
},
|
|
{
|
|
"version_value": "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Siemens AG"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "105931",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/105931"
|
|
},
|
|
{
|
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf"
|
|
}
|
|
]
|
|
}
|
|
} |