All the vulnerabilites related to Siemens - SPPA-T3000 MS3000 Migration Server
var-201912-1267
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1267", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "NVD", "id": "CVE-2019-18301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18301" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-614" } ], "trust": 0.6 }, "cve": "CVE-2019-18301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18301", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45384", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18301", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18301", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45384", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-614", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "NVD", "id": "CVE-2019-18301" }, { "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18301" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18301", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45384", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-614", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013212", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "CD5E68C3-9F68-4A16-B1CF-FE0EC9DE113E", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18301" }, { "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "id": "VAR-201912-1267", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" } ] }, "last_update_date": "2023-12-18T11:59:06.143000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45384)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194261" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "NVD", "id": "CVE-2019-18301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18301" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18301" }, { "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNVD", "id": "CNVD-2019-45384" }, { "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18301" }, { "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45384" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.983000", "db": "NVD", "id": "CVE-2019-18301" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45384" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013212" }, { "date": "2022-03-04T22:20:53.140000", "db": "NVD", "id": "CVE-2019-18301" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-614" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-614" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013212" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "cd5e68c3-9f68-4a16-b1cf-fe0ec9de113e" }, { "db": "CNNVD", "id": "CNNVD-201912-614" } ], "trust": 0.8 } }
var-201912-1270
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1270", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "NVD", "id": "CVE-2019-18304" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18304" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-617" } ], "trust": 0.6 }, "cve": "CVE-2019-18304", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18304", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45381", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "a7280be4-bc0c-424f-9442-98356b96a7d7", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18304", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18304", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45381", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-617", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-18304", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "VULMON", "id": "CVE-2019-18304" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "NVD", "id": "CVE-2019-18304" }, { "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18304" }, { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "VULMON", "id": "CVE-2019-18304" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18304", "trust": 3.4 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.3 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45381", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-617", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013209", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "A7280BE4-BC0C-424F-9442-98356B96A7D7", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2019-18304", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "VULMON", "id": "CVE-2019-18304" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18304" }, { "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "id": "VAR-201912-1270", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" } ] }, "last_update_date": "2023-12-18T11:59:06.753000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45381)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194255" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=abc44ea961d2d15de1d1eca8d6f07d8a" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "VULMON", "id": "CVE-2019-18304" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "NVD", "id": "CVE-2019-18304" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18304" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-451445.txt" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "VULMON", "id": "CVE-2019-18304" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18304" }, { "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNVD", "id": "CNVD-2019-45381" }, { "db": "VULMON", "id": "CVE-2019-18304" }, { "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18304" }, { "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45381" }, { "date": "2019-12-12T00:00:00", "db": "VULMON", "id": "CVE-2019-18304" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.233000", "db": "NVD", "id": "CVE-2019-18304" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45381" }, { "date": "2019-12-18T00:00:00", "db": "VULMON", "id": "CVE-2019-18304" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013209" }, { "date": "2022-03-04T22:20:28.847000", "db": "NVD", "id": "CVE-2019-18304" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-617" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-617" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to integer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013209" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "a7280be4-bc0c-424f-9442-98356b96a7d7" }, { "db": "CNNVD", "id": "CNNVD-201912-617" } ], "trust": 0.8 } }
var-201912-1290
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 This is a different vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18324" } ] }, "cve": "CVE-2019-18324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18324", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44773", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18324", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18324", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44773", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-640", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" }, { "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 This is a different vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18324" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18324", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44773", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-640", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013106", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "F0E0DD98-1031-4BE6-9AD3-59DF51CE348B", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" }, { "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "id": "VAR-201912-1290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" } ] }, "last_update_date": "2023-12-18T11:59:07.557000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44773)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193749" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18324" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18324" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" }, { "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNVD", "id": "CNVD-2019-44773" }, { "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "db": "NVD", "id": "CVE-2019-18324" }, { "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44773" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "date": "2019-12-12T19:15:18.920000", "db": "NVD", "id": "CVE-2019-18324" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44773" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013106" }, { "date": "2022-03-04T22:17:57.083000", "db": "NVD", "id": "CVE-2019-18324" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-640" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-640" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013106" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "f0e0dd98-1031-4be6-9ad3-59df51ce348b" }, { "db": "CNNVD", "id": "CNNVD-201912-640" } ], "trust": 0.8 } }
var-201912-1257
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1257", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "NVD", "id": "CVE-2019-18291" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18291" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-603" } ], "trust": 0.6 }, "cve": "CVE-2019-18291", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18291", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45409", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "fed964f9-7e00-444e-a81a-98ee90609d5f", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18291", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18291", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45409", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-603", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "NVD", "id": "CVE-2019-18291" }, { "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18291" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18291", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45409", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-603", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013215", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "FED964F9-7E00-444E-A81A-98EE90609D5F", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18291" }, { "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "id": "VAR-201912-1257", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" } ] }, "last_update_date": "2023-12-18T11:59:06.413000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45409)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194209" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "NVD", "id": "CVE-2019-18291" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18291" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18291" }, { "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNVD", "id": "CNVD-2019-45409" }, { "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18291" }, { "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45409" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.093000", "db": "NVD", "id": "CVE-2019-18291" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45409" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013215" }, { "date": "2022-03-04T22:26:38.650000", "db": "NVD", "id": "CVE-2019-18291" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-603" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-603" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013215" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "fed964f9-7e00-444e-a81a-98ee90609d5f" }, { "db": "CNNVD", "id": "CNNVD-201912-603" } ], "trust": 0.8 } }
var-201912-1269
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "NVD", "id": "CVE-2019-18303" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18303" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-616" } ], "trust": 0.6 }, "cve": "CVE-2019-18303", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18303", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45382", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "f3b45269-a502-4882-81ab-230bd41419f3", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18303", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18303", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45382", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-616", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "NVD", "id": "CVE-2019-18303" }, { "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18303" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18303", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45382", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-616", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013208", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "F3B45269-A502-4882-81AB-230BD41419F3", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18303" }, { "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "id": "VAR-201912-1269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" } ] }, "last_update_date": "2023-12-18T11:59:06.105000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45382)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194257" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "NVD", "id": "CVE-2019-18303" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18303" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18303" }, { "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNVD", "id": "CNVD-2019-45382" }, { "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18303" }, { "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45382" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.140000", "db": "NVD", "id": "CVE-2019-18303" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45382" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013208" }, { "date": "2022-03-04T22:20:37.027000", "db": "NVD", "id": "CVE-2019-18303" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-616" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-616" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013208" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "f3b45269-a502-4882-81ab-230bd41419f3" }, { "db": "CNNVD", "id": "CNNVD-201912-616" } ], "trust": 0.8 } }
var-201912-1279
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 MS3000 Migration Server Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1279", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18313" } ] }, "cve": "CVE-2019-18313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18313", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45375", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18313", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18313", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-45375", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-628", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" }, { "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 MS3000 Migration Server Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18313" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18313", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-628", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013108", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "1F2EF43D-9FCB-4657-BCC8-593F8462E363", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" }, { "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "id": "VAR-201912-1279", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" } ] }, "last_update_date": "2023-12-18T11:59:06.213000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server File Upload Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194233" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-434", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18313" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18313" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" }, { "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" }, { "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "db": "NVD", "id": "CVE-2019-18313" }, { "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "date": "2019-12-12T00:00:00", "db": "CNVD", "id": "CNVD-2019-45375" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "date": "2019-12-12T19:15:18.060000", "db": "NVD", "id": "CVE-2019-18313" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45375" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013108" }, { "date": "2022-03-04T22:18:38.517000", "db": "NVD", "id": "CVE-2019-18313" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-628" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-628" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server File upload vulnerability", "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNVD", "id": "CNVD-2019-45375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "1f2ef43d-9fcb-4657-bcc8-593f8462e363" }, { "db": "CNNVD", "id": "CNNVD-201912-628" } ], "trust": 0.8 } }
var-201912-1256
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "NVD", "id": "CVE-2019-18290" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18290" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-602" } ], "trust": 0.6 }, "cve": "CVE-2019-18290", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18290", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45410", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "176077d8-0562-455e-9f56-d1c3b287e9a5", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18290", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18290", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45410", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-602", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-18290", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "VULMON", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "NVD", "id": "CVE-2019-18290" }, { "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "VULMON", "id": "CVE-2019-18290" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18290", "trust": 3.4 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.3 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45410", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-602", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013214", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "176077D8-0562-455E-9F56-D1C3B287E9A5", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2019-18290", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "VULMON", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18290" }, { "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "id": "VAR-201912-1256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" } ] }, "last_update_date": "2023-12-18T11:59:05.786000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45410)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194211" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=abc44ea961d2d15de1d1eca8d6f07d8a" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "VULMON", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "NVD", "id": "CVE-2019-18290" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18290" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-451445.txt" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "VULMON", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18290" }, { "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNVD", "id": "CNVD-2019-45410" }, { "db": "VULMON", "id": "CVE-2019-18290" }, { "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18290" }, { "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45410" }, { "date": "2019-12-12T00:00:00", "db": "VULMON", "id": "CVE-2019-18290" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:15.997000", "db": "NVD", "id": "CVE-2019-18290" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45410" }, { "date": "2022-03-04T00:00:00", "db": "VULMON", "id": "CVE-2019-18290" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013214" }, { "date": "2022-03-04T22:26:43.187000", "db": "NVD", "id": "CVE-2019-18290" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-602" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-602" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013214" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "176077d8-0562-455e-9f56-d1c3b287e9a5" }, { "db": "CNNVD", "id": "CNNVD-201912-602" } ], "trust": 0.8 } }
var-201912-1289
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18323" } ] }, "cve": "CVE-2019-18323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18323", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44774", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18323", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18323", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44774", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-641", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" }, { "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18323" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18323", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44774", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-641", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013105", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "1B52A85F-B104-4A2B-AC88-6B9BD2F95849", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" }, { "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "id": "VAR-201912-1289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" } ] }, "last_update_date": "2023-12-18T11:59:05.616000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44774)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193753" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18323" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18323" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" }, { "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNVD", "id": "CNVD-2019-44774" }, { "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "db": "NVD", "id": "CVE-2019-18323" }, { "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44774" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "date": "2019-12-12T19:15:18.857000", "db": "NVD", "id": "CVE-2019-18323" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44774" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013105" }, { "date": "2022-03-04T22:27:02.660000", "db": "NVD", "id": "CVE-2019-18323" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-641" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-641" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013105" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "1b52a85f-b104-4a2b-ac88-6b9bd2f95849" }, { "db": "CNNVD", "id": "CNNVD-201912-641" } ], "trust": 0.8 } }
var-201912-1296
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18329. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1296", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18330" } ] }, "cve": "CVE-2019-18330", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18330", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44778", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "72270e30-391b-4754-a0a7-4cde3756e72a", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18330", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18330", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44778", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-647", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" }, { "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18329. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18330" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18330", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44778", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-647", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013099", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "72270E30-391B-4754-A0A7-4CDE3756E72A", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" }, { "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "id": "VAR-201912-1296", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" } ] }, "last_update_date": "2023-12-18T11:59:05.904000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193703" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18330" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18330" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" }, { "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" }, { "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "db": "NVD", "id": "CVE-2019-18330" }, { "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44778" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "date": "2019-12-12T19:15:19.453000", "db": "NVD", "id": "CVE-2019-18330" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44778" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013099" }, { "date": "2022-03-04T22:21:15.247000", "db": "NVD", "id": "CVE-2019-18330" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-647" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-647" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNVD", "id": "CNVD-2019-44778" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "72270e30-391b-4754-a0a7-4cde3756e72a" }, { "db": "CNNVD", "id": "CNNVD-201912-647" } ], "trust": 0.8 } }
var-201912-1271
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1271", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "NVD", "id": "CVE-2019-18305" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18305" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-619" } ], "trust": 0.6 }, "cve": "CVE-2019-18305", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18305", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45380", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "f1534acb-89b5-434a-82b8-ffa21ddad692", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18305", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18305", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45380", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-619", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "NVD", "id": "CVE-2019-18305" }, { "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18305" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18305", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-619", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013112", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "F1534ACB-89B5-434A-82B8-FFA21DDAD692", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18305" }, { "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "id": "VAR-201912-1271", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" } ] }, "last_update_date": "2023-12-18T11:59:05.649000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194253" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "NVD", "id": "CVE-2019-18305" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18305" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18305" }, { "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" }, { "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18305" }, { "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45380" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.327000", "db": "NVD", "id": "CVE-2019-18305" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45380" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013112" }, { "date": "2022-03-04T22:20:23.197000", "db": "NVD", "id": "CVE-2019-18305" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-619" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-619" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNVD", "id": "CNVD-2019-45380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "f1534acb-89b5-434a-82b8-ffa21ddad692" }, { "db": "CNNVD", "id": "CNNVD-201912-619" } ], "trust": 0.8 } }
var-201912-1265
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1265", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "NVD", "id": "CVE-2019-18299" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18299" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-612" } ], "trust": 0.6 }, "cve": "CVE-2019-18299", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18299", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45424", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "cb85913f-982b-4a54-9175-675c727cbd9e", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18299", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18299", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45424", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-612", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "NVD", "id": "CVE-2019-18299" }, { "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18299" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18299", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45424", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-612", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013218", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "CB85913F-982B-4A54-9175-675C727CBD9E", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18299" }, { "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "id": "VAR-201912-1265", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" } ] }, "last_update_date": "2023-12-18T11:59:07.068000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45424)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194193" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 }, { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "NVD", "id": "CVE-2019-18299" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18299" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18299" }, { "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNVD", "id": "CNVD-2019-45424" }, { "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18299" }, { "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45424" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.797000", "db": "NVD", "id": "CVE-2019-18299" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45424" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013218" }, { "date": "2022-03-04T20:03:43.133000", "db": "NVD", "id": "CVE-2019-18299" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-612" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-612" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013218" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "cb85913f-982b-4a54-9175-675c727cbd9e" }, { "db": "CNNVD", "id": "CNNVD-201912-612" } ], "trust": 0.8 } }
var-201912-1276
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18311. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18311 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1276", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18310" } ] }, "cve": "CVE-2019-18310", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18310", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45378", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18310", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18310", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45378", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-624", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" }, { "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18311. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18311 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18310" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18310", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-624", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013111", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "AECFEA44-323A-4C7B-B6AB-DD854DDB4ABF", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" }, { "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "id": "VAR-201912-1276", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" } ] }, "last_update_date": "2023-12-18T11:59:05.752000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194241" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18310" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18310" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" }, { "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" }, { "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "db": "NVD", "id": "CVE-2019-18310" }, { "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45378" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "date": "2019-12-12T19:15:17.810000", "db": "NVD", "id": "CVE-2019-18310" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45378" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013111" }, { "date": "2022-03-04T22:19:44.477000", "db": "NVD", "id": "CVE-2019-18310" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-624" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-624" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNVD", "id": "CNVD-2019-45378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "aecfea44-323a-4c7b-b6ab-dd854ddb4abf" }, { "db": "CNNVD", "id": "CNNVD-201912-624" } ], "trust": 0.8 } }
var-201912-1263
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 MS3000 Migration Server Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "NVD", "id": "CVE-2019-18297" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18297" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-609" } ], "trust": 0.6 }, "cve": "CVE-2019-18297", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-18297", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2019-45417", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18297", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18297", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45417", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-609", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "NVD", "id": "CVE-2019-18297" }, { "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 MS3000 Migration Server Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18297" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18297", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45417", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-609", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013220", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "6A06EFB0-9477-47E1-81F9-BE9A54EE627C", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18297" }, { "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "id": "VAR-201912-1263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" } ] }, "last_update_date": "2023-12-18T11:59:06.314000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45417)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194239" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "NVD", "id": "CVE-2019-18297" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18297" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18297" }, { "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNVD", "id": "CNVD-2019-45417" }, { "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18297" }, { "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45417" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.623000", "db": "NVD", "id": "CVE-2019-18297" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45417" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013220" }, { "date": "2022-03-04T22:16:41.617000", "db": "NVD", "id": "CVE-2019-18297" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-609" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-609" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013220" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "6a06efb0-9477-47e1-81f9-be9a54ee627c" }, { "db": "CNNVD", "id": "CNNVD-201912-609" } ], "trust": 0.8 } }
var-201912-1288
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18321. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18321 Is a different vulnerability.Information may be obtained and information may be altered. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18322" } ] }, "cve": "CVE-2019-18322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18322", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44771", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18322", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18322", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44771", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-639", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" }, { "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18321. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18321 Is a different vulnerability.Information may be obtained and information may be altered. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18322" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18322", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44771", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-639", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013104", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "FC15B570-E354-45B7-A73F-E91CEA4CFE98", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" }, { "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "id": "VAR-201912-1288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" } ] }, "last_update_date": "2023-12-18T11:59:06.513000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Improper Authentication Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193755" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18322" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18322" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" }, { "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" }, { "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "db": "NVD", "id": "CVE-2019-18322" }, { "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44771" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "date": "2019-12-12T19:15:18.780000", "db": "NVD", "id": "CVE-2019-18322" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44771" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013104" }, { "date": "2022-03-04T22:18:17.220000", "db": "NVD", "id": "CVE-2019-18322" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-639" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-639" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 Improper Authentication Vulnerability", "sources": [ { "db": "IVD", "id": "fc15b570-e354-45b7-a73f-e91cea4cfe98" }, { "db": "CNVD", "id": "CNVD-2019-44771" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-639" } ], "trust": 0.6 } }
var-201912-1277
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18310. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18310 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1277", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18311" } ] }, "cve": "CVE-2019-18311", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18311", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45377", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18311", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18311", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45377", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-625", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" }, { "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18310. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18310 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18311" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18311", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45377", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-625", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013110", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "B7D880D4-79EB-4AD6-A2CF-94F15751FD37", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" }, { "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "id": "VAR-201912-1277", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" } ] }, "last_update_date": "2023-12-18T11:59:06.931000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194237" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18311" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18311" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" }, { "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" }, { "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "db": "NVD", "id": "CVE-2019-18311" }, { "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45377" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "date": "2019-12-12T19:15:17.890000", "db": "NVD", "id": "CVE-2019-18311" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45377" }, { "date": "2019-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013110" }, { "date": "2022-03-04T22:19:35.353000", "db": "NVD", "id": "CVE-2019-18311" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-625" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-625" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server Denial of service vulnerability", "sources": [ { "db": "IVD", "id": "b7d880d4-79eb-4ad6-a2cf-94f15751fd37" }, { "db": "CNVD", "id": "CNVD-2019-45377" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-625" } ], "trust": 0.6 } }
var-201912-1261
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18293 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "NVD", "id": "CVE-2019-18295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18295" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-607" } ], "trust": 0.6 }, "cve": "CVE-2019-18295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18295", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2019-45419", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18295", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18295", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-45419", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-607", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "NVD", "id": "CVE-2019-18295" }, { "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18293 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18295" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18295", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45419", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-607", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013222", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "14B2EFAA-6FBE-40C6-BD0D-0BA96E7EDDCD", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18295" }, { "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "id": "VAR-201912-1261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" } ] }, "last_update_date": "2023-12-18T11:59:06.179000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45419)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194201" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "NVD", "id": "CVE-2019-18295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18295" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18295" }, { "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNVD", "id": "CNVD-2019-45419" }, { "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18295" }, { "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45419" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.467000", "db": "NVD", "id": "CVE-2019-18295" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45419" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013222" }, { "date": "2022-03-04T22:26:15.177000", "db": "NVD", "id": "CVE-2019-18295" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-607" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-607" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013222" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "14b2efaa-6fbe-40c6-bd0d-0ba96e7eddcd" }, { "db": "CNNVD", "id": "CNNVD-201912-607" } ], "trust": 0.8 } }
var-201912-1293
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1293", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18327" } ] }, "cve": "CVE-2019-18327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18327", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44776", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "534463c0-0440-4c16-979b-b172784a34a9", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18327", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18327", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44776", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-643", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" }, { "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18327" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18327", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44776", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-643", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013096", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "534463C0-0440-4C16-979B-B172784A34A9", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" }, { "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "id": "VAR-201912-1293", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" } ] }, "last_update_date": "2023-12-18T11:59:05.832000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44776)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18327" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18327" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" }, { "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNVD", "id": "CNVD-2019-44776" }, { "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "db": "NVD", "id": "CVE-2019-18327" }, { "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44776" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "date": "2019-12-12T19:15:19.157000", "db": "NVD", "id": "CVE-2019-18327" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44776" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013096" }, { "date": "2022-03-04T22:15:52.843000", "db": "NVD", "id": "CVE-2019-18327" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-643" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-643" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013096" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "534463c0-0440-4c16-979b-b172784a34a9" }, { "db": "CNNVD", "id": "CNNVD-201912-643" } ], "trust": 0.8 } }
var-201912-1260
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "NVD", "id": "CVE-2019-18294" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18294" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-606" } ], "trust": 0.6 }, "cve": "CVE-2019-18294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18294", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45420", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18294", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45420", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-606", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "NVD", "id": "CVE-2019-18294" }, { "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18294" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18294", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45420", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-606", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013223", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "E341ADEF-3CB6-4A51-88AE-04231F9CEB44", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18294" }, { "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "id": "VAR-201912-1260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" } ] }, "last_update_date": "2023-12-18T11:59:07.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45420)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194203" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "NVD", "id": "CVE-2019-18294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18294" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18294" }, { "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNVD", "id": "CNVD-2019-45420" }, { "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18294" }, { "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45420" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.373000", "db": "NVD", "id": "CVE-2019-18294" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45420" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013223" }, { "date": "2022-03-04T22:26:20.947000", "db": "NVD", "id": "CVE-2019-18294" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-606" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-606" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013223" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e341adef-3cb6-4a51-88ae-04231f9ceb44" }, { "db": "CNNVD", "id": "CNNVD-201912-606" } ], "trust": 0.8 } }
var-201912-1292
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1292", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18326" } ] }, "cve": "CVE-2019-18326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18326", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44775", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18326", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18326", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44775", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-645", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" }, { "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18326" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18326", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44775", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-645", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013095", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "36C32599-CE95-40D7-A823-3AD0B91C7DFF", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" }, { "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "id": "VAR-201912-1292", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" } ] }, "last_update_date": "2023-12-18T11:59:06.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44775)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193741" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18326" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18326" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" }, { "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNVD", "id": "CNVD-2019-44775" }, { "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "db": "NVD", "id": "CVE-2019-18326" }, { "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44775" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "date": "2019-12-12T19:15:19.093000", "db": "NVD", "id": "CVE-2019-18326" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44775" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013095" }, { "date": "2022-03-04T22:26:57.617000", "db": "NVD", "id": "CVE-2019-18326" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-645" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-645" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013095" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "36c32599-ce95-40d7-a823-3ad0b91c7dff" }, { "db": "CNNVD", "id": "CNNVD-201912-645" } ], "trust": 0.8 } }
var-201912-1258
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1258", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "NVD", "id": "CVE-2019-18292" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18292" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-604" } ], "trust": 0.6 }, "cve": "CVE-2019-18292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18292", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45422", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "5d980463-7d36-479b-9af7-ea413bdcb027", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18292", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18292", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45422", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-604", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "NVD", "id": "CVE-2019-18292" }, { "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18292" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18292", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45422", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-604", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013116", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "5D980463-7D36-479B-9AF7-EA413BDCB027", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18292" }, { "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "id": "VAR-201912-1258", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" } ] }, "last_update_date": "2023-12-18T11:59:06.070000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45422)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194207" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "NVD", "id": "CVE-2019-18292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18292" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18292" }, { "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNVD", "id": "CNVD-2019-45422" }, { "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18292" }, { "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45422" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.187000", "db": "NVD", "id": "CVE-2019-18292" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45422" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013116" }, { "date": "2022-03-04T22:26:33.890000", "db": "NVD", "id": "CVE-2019-18292" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-604" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-604" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013116" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "5d980463-7d36-479b-9af7-ea413bdcb027" }, { "db": "CNNVD", "id": "CNNVD-201912-604" } ], "trust": 0.8 } }
var-201912-1291
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18325" } ] }, "cve": "CVE-2019-18325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18325", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44770", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18325", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18325", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44770", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-642", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" }, { "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18325" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18325", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44770", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-642", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013107", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "CF7FD51C-A22A-49FB-A08A-EFFEF22106D3", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" }, { "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "id": "VAR-201912-1291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" } ] }, "last_update_date": "2023-12-18T11:59:06.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44770)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193745" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18325" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18325" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" }, { "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNVD", "id": "CNVD-2019-44770" }, { "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "db": "NVD", "id": "CVE-2019-18325" }, { "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44770" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "date": "2019-12-12T19:15:18.997000", "db": "NVD", "id": "CVE-2019-18325" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44770" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013107" }, { "date": "2022-03-04T22:17:40.287000", "db": "NVD", "id": "CVE-2019-18325" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-642" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-642" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013107" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "cf7fd51c-a22a-49fb-a08a-effef22106d3" }, { "db": "CNNVD", "id": "CNNVD-201912-642" } ], "trust": 0.8 } }
var-201912-1262
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18295. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18293 , CVE-2019-18295 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "NVD", "id": "CVE-2019-18296" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18296" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-608" } ], "trust": 0.6 }, "cve": "CVE-2019-18296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18296", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2019-45418", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "c4b3276e-564f-410a-a43d-40ca991d1a65", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18296", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18296", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-45418", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-608", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "NVD", "id": "CVE-2019-18296" }, { "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18295. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18293 , CVE-2019-18295 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18296" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18296", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45418", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-608", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013221", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "C4B3276E-564F-410A-A43D-40CA991D1A65", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18296" }, { "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "id": "VAR-201912-1262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" } ] }, "last_update_date": "2023-12-18T11:59:05.686000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45418)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194199" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "NVD", "id": "CVE-2019-18296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18296" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18296" }, { "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNVD", "id": "CNVD-2019-45418" }, { "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18296" }, { "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45418" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.560000", "db": "NVD", "id": "CVE-2019-18296" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45418" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013221" }, { "date": "2022-03-04T22:23:02.320000", "db": "NVD", "id": "CVE-2019-18296" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-608" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-608" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013221" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "c4b3276e-564f-410a-a43d-40ca991d1a65" }, { "db": "CNNVD", "id": "CNNVD-201912-608" } ], "trust": 0.8 } }
var-201912-1273
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18306. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1273", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "NVD", "id": "CVE-2019-18307" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18307" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-621" } ], "trust": 0.6 }, "cve": "CVE-2019-18307", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18307", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45370", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "2df6f78d-c46e-4c46-9dae-45f11103f105", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18307", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18307", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45370", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-621", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "NVD", "id": "CVE-2019-18307" }, { "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18306. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18307" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18307", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45370", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-621", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013113", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "2DF6F78D-C46E-4C46-9DAE-45F11103F105", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18307" }, { "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "id": "VAR-201912-1273", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" } ] }, "last_update_date": "2023-12-18T11:59:07.739000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Out-of-bounds Read Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194247" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "NVD", "id": "CVE-2019-18307" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18307" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18307" }, { "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" }, { "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18307" }, { "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45370" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.513000", "db": "NVD", "id": "CVE-2019-18307" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45370" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013113" }, { "date": "2022-03-04T22:20:04.057000", "db": "NVD", "id": "CVE-2019-18307" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-621" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server Out-of-bounds read vulnerability", "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNVD", "id": "CNVD-2019-45370" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "2df6f78d-c46e-4c46-9dae-45f11103f105" }, { "db": "CNNVD", "id": "CNNVD-201912-621" } ], "trust": 0.8 } }
var-201912-1266
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "NVD", "id": "CVE-2019-18300" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18300" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-613" } ], "trust": 0.6 }, "cve": "CVE-2019-18300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18300", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45423", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "4e6c75c7-75db-469a-93f0-101676cd7601", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18300", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18300", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45423", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-613", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "NVD", "id": "CVE-2019-18300" }, { "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18300" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18300", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45423", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-613", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013213", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "4E6C75C7-75DB-469A-93F0-101676CD7601", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18300" }, { "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "id": "VAR-201912-1266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" } ] }, "last_update_date": "2023-12-18T11:59:06.896000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45423)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194251" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "NVD", "id": "CVE-2019-18300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18300" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18300" }, { "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNVD", "id": "CNVD-2019-45423" }, { "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18300" }, { "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45423" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.907000", "db": "NVD", "id": "CVE-2019-18300" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45423" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013213" }, { "date": "2022-03-04T22:20:57.840000", "db": "NVD", "id": "CVE-2019-18300" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-613" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-613" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013213" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "4e6c75c7-75db-469a-93f0-101676cd7601" }, { "db": "CNNVD", "id": "CNNVD-201912-613" } ], "trust": 0.8 } }
var-201912-1274
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18309. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18309 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1274", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18308" } ] }, "cve": "CVE-2019-18308", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-18308", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2019-45386", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "49ae0b73-6aa8-4871-8db4-46014c71f189", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18308", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18308", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45386", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-622", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" }, { "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18309. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18309 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18308" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18308", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45386", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-622", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013114", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "49AE0B73-6AA8-4871-8DB4-46014C71F189", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" }, { "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "id": "VAR-201912-1274", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" } ] }, "last_update_date": "2023-12-18T11:59:06.447000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Incorrect Access Control Vulnerability (CNVD-2019-45386)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194245" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-269", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18308" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18308" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" }, { "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "db": "CNVD", "id": "CNVD-2019-45386" }, { "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "db": "NVD", "id": "CVE-2019-18308" }, { "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "49ae0b73-6aa8-4871-8db4-46014c71f189" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45386" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "date": "2019-12-12T19:15:17.607000", "db": "NVD", "id": "CVE-2019-18308" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45386" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013114" }, { "date": "2022-03-04T22:19:57.810000", "db": "NVD", "id": "CVE-2019-18308" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-622" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-622" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerability in Permission Management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013114" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-622" } ], "trust": 0.6 } }
var-201912-1295
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18329" } ] }, "cve": "CVE-2019-18329", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18329", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44779", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18329", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18329", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44779", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-646", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" }, { "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18329" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18329", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44779", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-646", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013098", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "EA748E96-F168-44FF-A2B9-A4D9A1BC8FEB", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" }, { "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "id": "VAR-201912-1295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" } ] }, "last_update_date": "2023-12-18T11:59:06.037000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44779)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193707" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18329" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18329" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" }, { "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNVD", "id": "CNVD-2019-44779" }, { "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "db": "NVD", "id": "CVE-2019-18329" }, { "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44779" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "date": "2019-12-12T19:15:19.343000", "db": "NVD", "id": "CVE-2019-18329" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44779" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013098" }, { "date": "2022-03-04T22:21:28.157000", "db": "NVD", "id": "CVE-2019-18329" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-646" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-646" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013098" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "ea748e96-f168-44ff-a2b9-a4d9a1bc8feb" }, { "db": "CNNVD", "id": "CNNVD-201912-646" } ], "trust": 0.8 } }
var-201912-1294
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants.
Siemens SPPA-T3000 has a heap buffer overflow vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1294", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18328" } ] }, "cve": "CVE-2019-18328", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18328", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44780", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "1666e377-9ec1-4654-bf51-ccc010b308c4", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18328", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18328", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44780", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-644", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" }, { "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18323 , CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. \n\nSiemens SPPA-T3000 has a heap buffer overflow vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2019-18328" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18328", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44780", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-644", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013097", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "1666E377-9EC1-4654-BF51-CCC010B308C4", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" }, { "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "id": "VAR-201912-1294", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" } ] }, "last_update_date": "2023-12-18T11:59:05.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44780)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193737" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18328" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18328" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" }, { "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNVD", "id": "CNVD-2019-44780" }, { "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "db": "NVD", "id": "CVE-2019-18328" }, { "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44780" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "date": "2019-12-12T19:15:19.233000", "db": "NVD", "id": "CVE-2019-18328" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44780" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013097" }, { "date": "2022-03-04T22:21:34.320000", "db": "NVD", "id": "CVE-2019-18328" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-644" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-644" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013097" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "1666e377-9ec1-4654-bf51-ccc010b308c4" }, { "db": "CNNVD", "id": "CNNVD-201912-644" } ], "trust": 0.8 } }
var-201912-1007
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18293, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18293 , CVE-2019-18295 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1007", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "NVD", "id": "CVE-2019-18289" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18289" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-601" } ], "trust": 0.6 }, "cve": "CVE-2019-18289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18289", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45411", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "85618032-655c-46b7-a06c-b6af49d8fd03", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18289", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18289", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-45411", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-601", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "NVD", "id": "CVE-2019-18289" }, { "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18293, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18293 , CVE-2019-18295 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18289" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18289", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45411", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013217", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "85618032-655C-46B7-A06C-B6AF49D8FD03", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18289" }, { "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "id": "VAR-201912-1007", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" } ] }, "last_update_date": "2023-12-18T11:59:06.245000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45411)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194213" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "NVD", "id": "CVE-2019-18289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18289" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18289" }, { "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNVD", "id": "CNVD-2019-45411" }, { "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18289" }, { "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45411" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:15.937000", "db": "NVD", "id": "CVE-2019-18289" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45411" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013217" }, { "date": "2022-03-04T22:26:50.353000", "db": "NVD", "id": "CVE-2019-18289" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-601" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-601" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013217" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "85618032-655c-46b7-a06c-b6af49d8fd03" }, { "db": "CNNVD", "id": "CNNVD-201912-601" } ], "trust": 0.8 } }
var-201912-1278
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1278", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18312" } ] }, "cve": "CVE-2019-18312", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18312", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-45376", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7e813aeb-5666-4e7e-9733-f86207215ca6", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-18312", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18312", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-45376", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-627", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" }, { "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18312" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18312", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45376", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-627", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013109", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "7E813AEB-5666-4E7E-9733-F86207215CA6", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" }, { "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "id": "VAR-201912-1278", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" } ] }, "last_update_date": "2023-12-18T11:59:06.720000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Improper Authentication Vulnerability (CNVD-2019-45376)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194235" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18312" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18312" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" }, { "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "db": "CNVD", "id": "CNVD-2019-45376" }, { "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "db": "NVD", "id": "CVE-2019-18312" }, { "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "7e813aeb-5666-4e7e-9733-f86207215ca6" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45376" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "date": "2019-12-12T19:15:17.967000", "db": "NVD", "id": "CVE-2019-18312" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45376" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013109" }, { "date": "2022-03-04T22:19:14.437000", "db": "NVD", "id": "CVE-2019-18312" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-627" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-627" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Authentication vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013109" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-627" } ], "trust": 0.6 } }
var-201912-1264
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1264", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "NVD", "id": "CVE-2019-18298" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18298" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-611" } ], "trust": 0.6 }, "cve": "CVE-2019-18298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18298", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45425", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18298", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18298", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45425", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-611", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "NVD", "id": "CVE-2019-18298" }, { "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18298" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18298", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45425", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-611", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013219", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "BDB92A1B-3F49-4D46-A9CC-0FF761C02BF2", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18298" }, { "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "id": "VAR-201912-1264", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" } ] }, "last_update_date": "2023-12-18T11:59:05.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45425)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194197" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 }, { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "NVD", "id": "CVE-2019-18298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18298" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18298" }, { "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNVD", "id": "CNVD-2019-45425" }, { "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18298" }, { "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45425" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.717000", "db": "NVD", "id": "CVE-2019-18298" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45425" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013219" }, { "date": "2022-03-04T20:00:10.313000", "db": "NVD", "id": "CVE-2019-18298" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-611" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-611" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013219" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "bdb92a1b-3f49-4d46-a9cc-0ff761c02bf2" }, { "db": "CNNVD", "id": "CNNVD-201912-611" } ], "trust": 0.8 } }
var-201912-1259
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18295 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "NVD", "id": "CVE-2019-18293" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18293" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-605" } ], "trust": 0.6 }, "cve": "CVE-2019-18293", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18293", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45421", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18293", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18293", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-45421", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-605", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "NVD", "id": "CVE-2019-18293" }, { "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18289 , CVE-2019-18295 , CVE-2019-18296 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18293" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18293", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45421", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-605", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013224", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "145CFC72-C598-42BF-8C0F-E49BDC069F26", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18293" }, { "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "id": "VAR-201912-1259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" } ] }, "last_update_date": "2023-12-18T11:59:07.703000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Heap Buffer Overflow Vulnerability (CNVD-2019-45421)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194205" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "NVD", "id": "CVE-2019-18293" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18293" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18293" }, { "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNVD", "id": "CNVD-2019-45421" }, { "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18293" }, { "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45421" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:16.280000", "db": "NVD", "id": "CVE-2019-18293" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45421" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013224" }, { "date": "2022-03-04T22:26:27.973000", "db": "NVD", "id": "CVE-2019-18293" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-605" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-605" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013224" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "145cfc72-c598-42bf-8c0f-e49bdc069f26" }, { "db": "CNNVD", "id": "CNNVD-201912-605" } ], "trust": 0.8 } }
var-201912-1272
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1272", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "NVD", "id": "CVE-2019-18306" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18306" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-620" } ], "trust": 0.6 }, "cve": "CVE-2019-18306", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18306", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45371", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18306", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18306", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45371", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-620", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "NVD", "id": "CVE-2019-18306" }, { "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18302 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18306" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18306", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45371", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-620", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013210", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "64E37A6A-6CFF-4DC3-B6C0-642F6AE06DDC", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18306" }, { "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "id": "VAR-201912-1272", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" } ] }, "last_update_date": "2023-12-18T11:59:06.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SSPPA-T3000 MS3000 Migration Server Out-of-bounds Read Vulnerability (CNVD-2019-45371)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194249" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 }, { "problemtype": "CWE-125", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "NVD", "id": "CVE-2019-18306" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18306" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18306" }, { "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNVD", "id": "CNVD-2019-45371" }, { "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18306" }, { "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45371" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.420000", "db": "NVD", "id": "CVE-2019-18306" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45371" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013210" }, { "date": "2022-03-04T22:20:13.240000", "db": "NVD", "id": "CVE-2019-18306" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-620" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-620" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds reading", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013210" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "64e37a6a-6cff-4dc3-b6c0-642f6ae06ddc" }, { "db": "CNNVD", "id": "CNNVD-201912-620" } ], "trust": 0.8 } }
var-201912-1287
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18322. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18322 This is a different vulnerability.The information may be obtained and the information may be falsified. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18321" } ] }, "cve": "CVE-2019-18321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-18321", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-44772", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18321", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18321", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-44772", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-637", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" }, { "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18322. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18322 This is a different vulnerability.The information may be obtained and the information may be falsified. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18321" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18321", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-44772", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-637", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013103", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "5B0AC197-9DAE-4C35-A0A3-DFEF8009D3B6", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" }, { "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "id": "VAR-201912-1287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" } ] }, "last_update_date": "2023-12-18T11:59:07.635000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 Improper Authentication Vulnerability (CNVD-2019-44772)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/193757" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18321" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18321" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" }, { "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "db": "CNVD", "id": "CNVD-2019-44772" }, { "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "db": "NVD", "id": "CVE-2019-18321" }, { "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "IVD", "id": "5b0ac197-9dae-4c35-a0a3-dfef8009d3b6" }, { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44772" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "date": "2019-12-12T19:15:18.687000", "db": "NVD", "id": "CVE-2019-18321" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-11T00:00:00", "db": "CNVD", "id": "CNVD-2019-44772" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013103" }, { "date": "2022-03-04T22:18:30.057000", "db": "NVD", "id": "CVE-2019-18321" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-637" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-637" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Vulnerabilities in authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013103" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-637" } ], "trust": 0.6 } }
var-201912-1275
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18308. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18308 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1275", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18309" } ] }, "cve": "CVE-2019-18309", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-18309", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2019-45385", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "08ca25c6-5e77-46a2-9134-da0eca366892", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18309", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18309", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45385", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-623", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" }, { "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18308. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18308 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants", "sources": [ { "db": "NVD", "id": "CVE-2019-18309" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18309", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45385", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-623", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013115", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "08CA25C6-5E77-46A2-9134-DA0ECA366892", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" }, { "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "id": "VAR-201912-1275", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" } ] }, "last_update_date": "2023-12-18T11:59:05.721000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Incorrect Access Control Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-269", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18309" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18309" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" }, { "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" }, { "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "db": "NVD", "id": "CVE-2019-18309" }, { "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45385" }, { "date": "2019-12-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "date": "2019-12-12T19:15:17.717000", "db": "NVD", "id": "CVE-2019-18309" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45385" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013115" }, { "date": "2022-03-04T22:19:50.090000", "db": "NVD", "id": "CVE-2019-18309" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-623" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-623" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SPPA-T3000 MS3000 Migration Server Incorrect Access Control Vulnerability", "sources": [ { "db": "IVD", "id": "08ca25c6-5e77-46a2-9134-da0eca366892" }, { "db": "CNVD", "id": "CNVD-2019-45385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-623" } ], "trust": 0.6 } }
var-201912-1268
Vulnerability from variot
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sppa-t3000 ms3000 migration server", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sppa-t3000 ms3000 migration server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sppa t3000 ms3000 migration server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "NVD", "id": "CVE-2019-18302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-18302" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gleb Gritsai", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-615" } ], "trust": 0.6 }, "cve": "CVE-2019-18302", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18302", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-45383", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18302", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-18302", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-45383", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201912-615", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "NVD", "id": "CVE-2019-18302" }, { "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18290 , CVE-2019-18291 , CVE-2019-18292 , CVE-2019-18294 , CVE-2019-18298 , CVE-2019-18299 , CVE-2019-18300 , CVE-2019-18301 , CVE-2019-18303 , CVE-2019-18304 , CVE-2019-18305 , CVE-2019-18306 , CVE-2019-18307 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. MS3000 Migration Server is one of them", "sources": [ { "db": "NVD", "id": "CVE-2019-18302" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18302", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-451445", "trust": 2.2 }, { "db": "PACKETSTORM", "id": "155665", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-19-351-02", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2019-45383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-013211", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4705", "trust": 0.6 }, { "db": "IVD", "id": "5B9DCBF4-480F-4DFD-A4E2-CA2F1E60B762", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18302" }, { "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "id": "VAR-201912-1268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" } ], "trust": 1.4666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" } ] }, "last_update_date": "2023-12-18T11:59:07.031000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-451445", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "title": "Patch for Siemens SPPA-T3000 MS3000 Migration Server Integer Overflow Vulnerability (CNVD-2019-45383)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/194259" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "NVD", "id": "CVE-2019-18302" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/155665/siemens-security-advisory-sppa-t3000-code-execution.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18302" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-351-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18302" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4705/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18306" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18297" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18301" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18307" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18296" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18290" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18304" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18302" }, { "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNVD", "id": "CNVD-2019-45383" }, { "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "db": "PACKETSTORM", "id": "155665" }, { "db": "NVD", "id": "CVE-2019-18302" }, { "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45383" }, { "date": "2019-12-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "date": "2019-12-13T15:10:44", "db": "PACKETSTORM", "id": "155665" }, { "date": "2019-12-12T19:15:17.077000", "db": "NVD", "id": "CVE-2019-18302" }, { "date": "2019-12-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-45383" }, { "date": "2019-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013211" }, { "date": "2022-03-04T22:20:43.793000", "db": "NVD", "id": "CVE-2019-18302" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-615" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-615" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPPA-T3000 MS3000 Migration Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013211" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "5b9dcbf4-480f-4dfd-a4e2-ca2f1e60b762" }, { "db": "CNNVD", "id": "CNNVD-201912-615" } ], "trust": 0.8 } }
cve-2019-18302
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:42", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18302", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18293
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:26", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18293", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18322
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18321. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:17", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18321. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18322", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18311
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18310. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-952", "description": "CWE-952: SFP Secondary Cluster: Missing Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:57", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18310. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-952: SFP Secondary Cluster: Missing Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18311", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18308
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18309. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:52", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18309. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18308", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18313
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:01", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18313", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18313", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18295
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:29", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18295", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18291
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:22", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18291", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18299
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:36", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18299", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18312
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:59", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18312", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18327
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:25", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18327", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18304
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:45", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18304", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18294
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:27", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18294", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18305
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:47", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18305", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18324
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:20", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18324", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18330
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18329. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:30", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18329. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18330", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18296
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18295. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:31", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18295. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18296", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18303
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:43", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18303", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18323
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:14.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:19", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18323", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:14.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18326
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:14.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:24", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18326", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:14.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18300
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:38", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18300", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18325
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:22", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18325", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18325", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18310
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18311. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:56", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 7061/tcp. This vulnerability is independent from CVE-2019-18311. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121: Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18310", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18298
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:34", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18298", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18301
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:40", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18301", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18297
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:33", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18297", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18306
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:49", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18306", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18328
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:27", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18328", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18328", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18292
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:24", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18292", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18307
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18306. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:51", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18306. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18307", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18309
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:12.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18308. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:54", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and a low privileged user account could gain root privileges by manipulating specific files in the local file system. This vulnerability is independent from CVE-2019-18308. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18309", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:12.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18321
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18322. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:16", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to read and write arbitrary files on the local file system by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18322. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18321", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18329
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:13.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:52:29", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server can cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18323, CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18329", "datePublished": "2019-12-12T19:08:48", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:54:13.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18290
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:21", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18290", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18289
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
Siemens | SPPA-T3000 MS3000 Migration Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SPPA-T3000 MS3000 Migration Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18293, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T17:51:19", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-18289", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SPPA-T3000 MS3000 Migration Server", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18293, CVE-2019-18295, and CVE-2019-18296. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" }, { "name": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-18289", "datePublished": "2019-12-12T19:08:47", "dateReserved": "2019-10-23T00:00:00", "dateUpdated": "2024-08-05T01:47:14.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }