Search criteria
4 vulnerabilities found for telem-gw6 by martem
VAR-201810-0086
Vulnerability from variot - Updated: 2023-12-18 13:13Martem TELEM GW6/GWM versions prior to 2.0.87-4018403-k4 may allow unprivileged users to modify/upload a new system configuration or take the full control over the RTU using default credentials to connect to the RTU. Martem TELEM GW6/GWM Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MartemTELEMGW6/GWM are data processor products from Martem, Estonia. A security vulnerability exists in versions prior to MartemTELEMGW6/GWM2.0.87-4018403-k4
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201810-0086",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telem-gwm",
"scope": "lt",
"trust": 1.0,
"vendor": "martem",
"version": "2.0.87-4018403-k4"
},
{
"model": "telem-gw6",
"scope": "lt",
"trust": 1.0,
"vendor": "martem",
"version": "2.0.87-4018403-k4"
},
{
"model": "telem gw6",
"scope": "lt",
"trust": 0.8,
"vendor": "martem",
"version": "2.0.87-4018403-k4"
},
{
"model": "telem gwm",
"scope": "lt",
"trust": 0.8,
"vendor": "martem",
"version": "2.0.87-4018403-k4"
},
{
"model": "telem gw6/gwm \u003c2.0.87-4018403-k4",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gw6",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gwm",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gw6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.0.87-4018403-k4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gw6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gwm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.0.87-4018403-k4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gwm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10605"
}
]
},
"cve": "CVE-2018-10605",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2018-10605",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2019-07031",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "1bbcf237-5eda-443e-ad18-33424687df2c",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-10605",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10605",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2019-07031",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201810-020",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6/GWM versions prior to 2.0.87-4018403-k4 may allow unprivileged users to modify/upload a new system configuration or take the full control over the RTU using default credentials to connect to the RTU. Martem TELEM GW6/GWM Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MartemTELEMGW6/GWM are data processor products from Martem, Estonia. A security vulnerability exists in versions prior to MartemTELEMGW6/GWM2.0.87-4018403-k4",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10605",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-18-142-01",
"trust": 2.4
},
{
"db": "CNVD",
"id": "CNVD-2019-07031",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915",
"trust": 0.8
},
{
"db": "IVD",
"id": "1BBCF237-5EDA-443E-AD18-33424687DF2C",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"id": "VAR-201810-0086",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
}
]
},
"last_update_date": "2023-12-18T13:13:47.797000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SA1805183",
"trust": 0.8,
"url": "https://martem.eu/csa/martem_csa_telem_1805183.pdf"
},
{
"title": "Patch for MartemTELEMGW6/GWM privilege vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/156129"
},
{
"title": "Martem TELEM GW6/GWM Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86118"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-1188",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-142-01"
},
{
"trust": 1.6,
"url": "https://martem.eu/csa/martem_csa_telem_1805183.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10605"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10605"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-03-14T00:00:00",
"db": "IVD",
"id": "1bbcf237-5eda-443e-ad18-33424687df2c"
},
{
"date": "2019-03-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"date": "2018-12-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"date": "2018-10-01T16:29:00.440000",
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"date": "2018-10-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-03-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-07031"
},
{
"date": "2018-12-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010915"
},
{
"date": "2019-10-09T23:32:54.133000",
"db": "NVD",
"id": "CVE-2018-10605"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6/GWM Vulnerabilities related to authorization, permissions, and access control",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-010915"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-020"
}
],
"trust": 0.6
}
}
VAR-201807-0338
Vulnerability from variot - Updated: 2023-12-18 13:13Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. Martem TELEM GW6 and GWM The device firmware contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. 1. An security bypass vulnerability. 2. A denial-of-service vulnerability. 3. An cross-site scripting vulnerability. Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: GW6 Version 2018.04.18-linux_4-01-601cb47 and prior. GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201807-0338",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telem-gwm",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem-gw6",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gw6",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gw6 \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "gwm \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "telem gw6",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gwm 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": "gw6 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gwm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gw6",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gwm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gwm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gw6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gw6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10607"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Latvia,Bernhards Blumbergs and Arturs Danilevics of CERT.LV",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.6
},
"cve": "CVE-2018-10607",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-10607",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10590",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-120383",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-10607",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10607",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-10590",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1161",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-120383",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. Martem TELEM GW6 and GWM The device firmware contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. \n1. An security bypass vulnerability. \n2. A denial-of-service vulnerability. \n3. An cross-site scripting vulnerability. \nAttackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are affected:\nGW6 Version 2018.04.18-linux_4-01-601cb47 and prior. \nGWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-120383"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10607",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-142-01",
"trust": 3.4
},
{
"db": "BID",
"id": "104286",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-10590",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2F09800-39AB-11E9-BD1B-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-120383",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"id": "VAR-201807-0338",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
}
]
},
"last_update_date": "2023-12-18T13:13:47.719000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SA1805184",
"trust": 0.8,
"url": "https://martem.eu/csa/martem_csa_telem_1805184.pdf"
},
{
"title": "Martem GW6 and GWM Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80638"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-400",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-142-01"
},
{
"trust": 2.0,
"url": "http://martem.eu/csa/martem_csa_telem_1805184.pdf"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/104286"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10607"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10607"
},
{
"trust": 0.3,
"url": "http://martem.ee/"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805182.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"db": "VULHUB",
"id": "VHN-120383"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"date": "2018-07-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120383"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"date": "2018-07-31T17:29:00.327000",
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"date": "2018-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10590"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-120383"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008779"
},
{
"date": "2021-06-23T14:21:44.137000",
"db": "NVD",
"id": "CVE-2018-10607"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM-GW6/GWM Denial of service vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10590"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "e2f09800-39ab-11e9-bd1b-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1161"
}
],
"trust": 0.8
}
}
VAR-201807-0340
Vulnerability from variot - Updated: 2023-12-18 13:13Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow improper sanitization of data over a Websocket which may allow cross-site scripting and client-side code execution with target user privileges. Martem TELEM GW6 and GWM The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. 1. An security bypass vulnerability. 2. A denial-of-service vulnerability. 3. An cross-site scripting vulnerability. Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: GW6 Version 2018.04.18-linux_4-01-601cb47 and prior. GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. The vulnerability is caused by the program not filtering data correctly
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201807-0340",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telem-gwm",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem-gw6",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gw6",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gw6 \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "gwm \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "telem gw6",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gwm 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": "gw6 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gwm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gw6",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gwm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gwm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gw6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gw6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10609"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Latvia,Bernhards Blumbergs and Arturs Danilevics of CERT.LV",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
],
"trust": 0.6
},
"cve": "CVE-2018-10609",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-10609",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10589",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-120385",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-10609",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10609",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-10589",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1162",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-120385",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "VULHUB",
"id": "VHN-120385"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow improper sanitization of data over a Websocket which may allow cross-site scripting and client-side code execution with target user privileges. Martem TELEM GW6 and GWM The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. \n1. An security bypass vulnerability. \n2. A denial-of-service vulnerability. \n3. An cross-site scripting vulnerability. \nAttackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are affected:\nGW6 Version 2018.04.18-linux_4-01-601cb47 and prior. \nGWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. The vulnerability is caused by the program not filtering data correctly",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-120385"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10609",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-142-01",
"trust": 3.4
},
{
"db": "BID",
"id": "104286",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-10589",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2F070F0-39AB-11E9-841A-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-120385",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "VULHUB",
"id": "VHN-120385"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"id": "VAR-201807-0340",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "VULHUB",
"id": "VHN-120385"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
}
]
},
"last_update_date": "2023-12-18T13:13:47.760000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SA1805181",
"trust": 0.8,
"url": "https://martem.eu/csa/martem_csa_telem_1805181.pdf"
},
{
"title": "Martem GW6 and GWM Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80639"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120385"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-142-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/104286"
},
{
"trust": 1.7,
"url": "http://martem.eu/csa/martem_csa_telem_1805181.pdf"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10609"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10609"
},
{
"trust": 0.3,
"url": "http://martem.ee/"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805182.pdf"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805184.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "VULHUB",
"id": "VHN-120385"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"db": "VULHUB",
"id": "VHN-120385"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"date": "2018-07-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120385"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"date": "2018-07-31T17:29:00.373000",
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"date": "2018-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10589"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-120385"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008780"
},
{
"date": "2021-06-23T14:21:44.137000",
"db": "NVD",
"id": "CVE-2018-10609"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM-GW6/GWM Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2f070f0-39ab-11e9-841a-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10589"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1162"
}
],
"trust": 0.6
}
}
VAR-201807-0336
Vulnerability from variot - Updated: 2023-12-18 13:13Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior do not perform authentication of IEC-104 control commands, which may allow a rogue node a remote control of the industrial process. Martem TELEM GW6 and GWM There is an authentication vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. 1. An security bypass vulnerability. 2. A denial-of-service vulnerability. 3. An cross-site scripting vulnerability. Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: GW6 Version 2018.04.18-linux_4-01-601cb47 and prior. GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. Martem GW6 2018.04.18-linux_4-01-601cb47 and earlier versions and GWM 2018.04.18-linux_4-01-601cb47 and earlier versions have an authorization problem vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201807-0336",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telem-gwm",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem-gw6",
"scope": "lte",
"trust": 1.0,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gw6",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "lte",
"trust": 0.8,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gw6 \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "gwm \u003c=2018.04.18-linux 4-01-601cb47",
"scope": null,
"trust": 0.6,
"vendor": "martem",
"version": null
},
{
"model": "telem gw6",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "telem gwm",
"scope": "eq",
"trust": 0.6,
"vendor": "martem",
"version": "2018.04.18-linux_4-01-601cb47"
},
{
"model": "gwm 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": "gw6 2018.04.18-linux 4-0",
"scope": null,
"trust": 0.3,
"vendor": "martem",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gwm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "telem gw6",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gwm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gwm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:martem:telem-gw6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2018.04.18-linux_4-01-601cb47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:martem:telem-gw6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10603"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Latvia,Bernhards Blumbergs and Arturs Danilevics of CERT.LV",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
],
"trust": 0.6
},
"cve": "CVE-2018-10603",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-10603",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 9.7,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10591",
"impactScore": 9.5,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 9.7,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "e2f09801-39ab-11e9-8803-000c29342cb1",
"impactScore": 9.5,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-120379",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-10603",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10603",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2018-10591",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1160",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-120379",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "VULHUB",
"id": "VHN-120379"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior do not perform authentication of IEC-104 control commands, which may allow a rogue node a remote control of the industrial process. Martem TELEM GW6 and GWM There is an authentication vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities. \n1. An security bypass vulnerability. \n2. A denial-of-service vulnerability. \n3. An cross-site scripting vulnerability. \nAttackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are affected:\nGW6 Version 2018.04.18-linux_4-01-601cb47 and prior. \nGWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. Martem GW6 2018.04.18-linux_4-01-601cb47 and earlier versions and GWM 2018.04.18-linux_4-01-601cb47 and earlier versions have an authorization problem vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-120379"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10603",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-18-142-01",
"trust": 3.4
},
{
"db": "BID",
"id": "104286",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-10591",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2F09801-39AB-11E9-8803-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-120379",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "VULHUB",
"id": "VHN-120379"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"id": "VAR-201807-0336",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "VULHUB",
"id": "VHN-120379"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
}
]
},
"last_update_date": "2023-12-18T13:13:47.682000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Telem-GW6",
"trust": 0.8,
"url": "https://www.martem.ee/telem-gw6/"
},
{
"title": "Martem GW6 and GWM Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80637"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120379"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-142-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/104286"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10603"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10603"
},
{
"trust": 0.3,
"url": "http://martem.ee/"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805182.pdf"
},
{
"trust": 0.3,
"url": "http://martem.eu/csa/martem_csa_telem_1805184.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "VULHUB",
"id": "VHN-120379"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"db": "VULHUB",
"id": "VHN-120379"
},
{
"db": "BID",
"id": "104286"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "IVD",
"id": "e2f09801-39ab-11e9-8803-000c29342cb1"
},
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"date": "2018-07-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120379"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"date": "2018-07-31T17:29:00.280000",
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"date": "2018-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10591"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-120379"
},
{
"date": "2018-05-22T00:00:00",
"db": "BID",
"id": "104286"
},
{
"date": "2018-10-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-008778"
},
{
"date": "2021-06-23T14:21:44.137000",
"db": "NVD",
"id": "CVE-2018-10603"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Martem TELEM GW6 and GWM Authentication vulnerabilities in device firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-008778"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1160"
}
],
"trust": 0.6
}
}