All the vulnerabilites related to siemens - tim_3v-ie_dnp3
Vulnerability from fkie_nvd
Published
2020-04-14 20:15
Modified
2024-11-21 04:20
Severity ?
Summary
A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | tim_3v-ie_firmware | * | |
siemens | tim_3v-ie | - | |
siemens | tim_3v-ie_advanced_firmware | * | |
siemens | tim_3v-ie_advanced | - | |
siemens | tim_4r-ie_firmware | * | |
siemens | tim_4r-ie | - | |
siemens | tim_3v-ie_dnp3_firmware | * | |
siemens | tim_3v-ie_dnp3 | - | |
siemens | tim_4r-ie_dnp3_firmware | * | |
siemens | tim_4r-ie_dnp3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:tim_3v-ie_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE941163-1A8B-4BE4-8259-CCFF8890C76C", "versionEndExcluding": "2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:tim_3v-ie:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A3D550B-FF8C-4A33-B630-0297DE89E4A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:tim_3v-ie_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BF5BC34-A625-4AAB-BFA1-BD7F99A0D54D", "versionEndExcluding": "2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:tim_3v-ie_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC0F3C5A-B220-48E1-915E-CD77EC0C3CAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:tim_4r-ie_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6DF78B0-EACC-433A-86AD-62D68AA0E05E", "versionEndExcluding": "3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:tim_4r-ie:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B87B16C-9E9F-448B-9255-B2BB2B8CAD63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:tim_3v-ie_dnp3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A0628FE-F792-4D3A-A299-42AD54237AEB", "versionEndExcluding": "2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:tim_3v-ie_dnp3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E224F1B2-72F8-47AF-AFA1-DDF70789B326", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D6173-4B71-4B52-A0C4-91F95CCCA0E1", "versionEndExcluding": "3.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE27728D-D37B-43FC-BA8A-0E930DDBD10B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en TIM 3V-IE (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V2.8), TIM 3V-IE Advanced (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V2.8), TIM 3V- IE DNP3 (incluyendo las variantes SIPLUS NET) (todas las versiones anteriores a V3.3), TIM 4R-IE (incluyendo las variantes SIPLUS NET) (todas las versiones anteriores a V2.8), TIM 4R-IE DNP3 (incluyendo las variantes SIPLUS NET) (Todas las versiones anteriores a V3.3). Las versiones afectadas contienen un puerto de depuraci\u00f3n abierto que est\u00e1 disponible bajo determinadas condiciones espec\u00edficas. La vulnerabilidad est\u00e1 solo disponible si la direcci\u00f3n IP est\u00e1 configurada en 192.168.1.2. Si est\u00e1 disponible, el puerto de depuraci\u00f3n podr\u00eda ser explotado por un atacante con acceso de red al dispositivo. No es requerida una interacci\u00f3n del usuario para explotar esta vulnerabilidad. La vulnerabilidad afecta la confidencialidad, integridad y disponibilidad del dispositivo afectado. En la etapa de publicaci\u00f3n de este aviso de seguridad ninguna explotaci\u00f3n p\u00fablica era conocida." } ], "id": "CVE-2019-10939", "lastModified": "2024-11-21T04:20:11.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-14T20:15:14.293", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-489" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-10939
Vulnerability from cvelistv5
Published
2020-04-14 19:50
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens AG | TIM 3V-IE (incl. SIPLUS NET variants) |
Version: All versions < V2.8 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TIM 3V-IE (incl. SIPLUS NET variants)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8" } ] }, { "product": "TIM 3V-IE Advanced (incl. SIPLUS NET variants)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8" } ] }, { "product": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "product": "TIM 4R-IE (incl. SIPLUS NET variants)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8" } ] }, { "product": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants)", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-489", "description": "CWE-489: Active Debug Code", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-14T19:50:54", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TIM 3V-IE (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8" } ] } }, { "product_name": "TIM 3V-IE Advanced (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8" } ] } }, { "product_name": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.3" } ] } }, { "product_name": "TIM 4R-IE (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8" } ] } }, { "product_name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.3" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions \u003c V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions \u003c V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-489: Active Debug Code" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-359303.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-10939", "datePublished": "2020-04-14T19:50:54", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }