René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

125 lines
4.1 KiB
JSON

{
"id": "CVE-2018-19282",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-04T21:29:00.660",
"lastModified": "2019-04-09T14:35:02.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a denial of service by crashing the Common Industrial Protocol (CIP) network stack. The vulnerability allows the attacker to crash the CIP in a way that it does not accept new connections, but keeps the current connections active, which can prevent legitimate users from recovering control."
},
{
"lang": "es",
"value": "Los motores de corriente alterna de Rockwell Automation PowerFlex 525, en versiones 5.001 y anteriores, permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un cierre inesperado de la pila de red de del CIP (Common Industrial Protocol). Esta vulnerabilidad permite al atacante cerrar inesperadamente el CIP de manera tal que no acepte nuevas conexiones, sino que mantenga activas las conexiones actuales, lo cual puede impedir a los usuarios recuperar el control."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:rockwellautomation:powerflex_525_ac_drives_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.001",
"matchCriteriaId": "4D8D4D32-D6DE-414C-9321-DCB1F334DAA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:rockwellautomation:powerflex_525_ac_drives:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8E8497-2C75-4C2C-ACF6-1C1D79DF4F37"
}
]
}
]
}
],
"references": [
{
"url": "https://applied-risk.com/application/files/4215/5385/2294/Advisory_AR2019004_Rockwell_Powerflex_525_Denial_of_Service.pdf",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-087-01",
"source": "cve@mitre.org",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
}
]
}