2024-12-08 03:06:42 +00:00

196 lines
7.4 KiB
JSON

{
"id": "CVE-2018-4845",
"sourceIdentifier": "productcert@siemens.com",
"published": "2018-06-26T18:29:00.807",
"lastModified": "2024-11-21T04:07:34.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). Remote attackers with either local or remote credentialed access to the \"Remote View\" feature might be able to elevate their privileges, compromising confidentiality, integrity, and availability of the system. No special skills or user interaction are required to perform this attack. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en los sistemas 1200 de RAPIDLab, los sistemas 400 de RAPIDPoint, los sistemas 500 de RAPIDPoint (todas las versiones sin usar productos Siemens Healthineers Informatics), las series 1200 de RAPIDLab (todas las versiones anteriores a la V3.3 con productos Siemens Healthineers Informatics), los sistemas 500 de RAPIDPoint (versiones 3.0 y posteriores con productos Siemens Healthineers Informatics), los sistemas 500 de RAPIDPoint (versiones 3.0 y posteriores con productos Siemens Healthineers Informatics), los sistemas 500 de RAPIDPoint (versiones 2.4.X con productos Siemens Healthineers Informatics) y los sistemas 400 de RAPIDPoint (todas las versiones con productos Siemens Healthineers Informatics). Los atacantes remotos con acceso con credenciales local o remoto a la caracter\u00edstica \"Remote View\" podr\u00edan elevar sus privilegios, comprometiendo la confidencialidad, integridad y disponibilidad del sistema. No se necesitan habilidades especiales o la interacci\u00f3n del usuario para realizar este ataque. En el momento de la publicaci\u00f3n del advisory, no se conoce ninguna explotaci\u00f3n p\u00fablica de la vulnerabilidad de seguridad. Siemens Healthineers confirma la vulnerabilidad de seguridad y proporciona mitigaciones para resolver el problema de seguridad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:rapidpoint_400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BD8C53-0B6B-4961-AF6E-302923B34118"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:rapidpoint_400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6081ED98-FD21-4C35-9E6F-95089EDB2905"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "15D5C974-4C15-450B-B9EF-51AE84A1741A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"matchCriteriaId": "B2624D5C-08DF-4D18-8EC5-51509C2BFCE9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4806F5-0292-45BA-96B9-422958D0CB0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:rapidlab_1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "8A093C69-118A-44F9-98ED-B2B103B1EFBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:rapidlab_1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "757CBCB7-BE66-43E2-BD7D-55B67A649EBC"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf",
"source": "productcert@siemens.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}