Action not permitted
Modal body text goes here.
CVE-2015-6574
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:22.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95022", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95022" }, { "tags": [ "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/" }, { "tags": [ "x_transferred" ], "url": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "95022", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/95022" }, { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/" }, { "url": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6574", "datePublished": "2016-12-15T00:00:00", "dateReserved": "2015-08-21T00:00:00", "dateUpdated": "2024-08-06T07:22:22.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-6574\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-12-15T22:59:00.413\",\"lastModified\":\"2022-12-13T12:15:17.873\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.\"},{\"lang\":\"es\",\"value\":\"El componente SNAP Lite en ciertos productos SISCO MMS-EASE y AX-S4 ICCP permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un paquete manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sisco:mms-ease_firmware:11.2000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B046E5A-0459-4C07-8F60-DFAC52C107A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sisco:mms-ease:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B40A018-72D3-47FB-BD17-A01A527F55DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sisco:ax-s4_iccp_firmware:6.0000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89E56A3-AEA8-418D-898F-C962363D4B49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sisco:ax-s4_iccp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A78ECE9-46D4-449D-BE6F-0F0C21CEBAAD\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/95022\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
var-201612-0252
Vulnerability from variot
The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet. (CPU consumption of resources ) It may be in a state. SISCOMMS-EASE and AX-S4ICCP are products of SISCO Corporation of the United States. The former is a set of C language programming interface (API) for MMS (manufacturing message specification), and the latter is a set of data sharing software. SNAP-LiteUtility is one of the data mining and analysis components. There are security vulnerabilities in the SNAP-LiteUtility component V3.2000 in the SISCOMMS-EASE and AX-S4ICCP products. SISCO SNAP-Lite Utility is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause the application to enter an infinite loop and consume excessive CPU resources, resulting in denial-of-service conditions. SISCO SNAP-Lite Utility 3.2000 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201612-0252", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mms-ease", "scope": "eq", "trust": 1.9, "vendor": "sisco", "version": "11.2000" }, { "model": "ax-s4 iccp", "scope": "eq", "trust": 1.9, "vendor": "sisco", "version": "6.0000" }, { "model": "mms-ease", "scope": null, "trust": 1.6, "vendor": "sisco", "version": null }, { "model": "ax-s4 iccp", "scope": null, "trust": 1.6, "vendor": "sisco", "version": null }, { "model": "ax-s4 iccp", "scope": "eq", "trust": 0.6, "vendor": "sisco", "version": "3.2000" }, { "model": "mms-ease", "scope": "eq", "trust": 0.6, "vendor": "sisco", "version": "3.2000" }, { "model": "snap-lite utility", "scope": "eq", "trust": 0.3, "vendor": "sisco", "version": "3.2000" }, { "model": "snap-lite utility", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "3.2000.2" }, { "model": "mms-ease", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "11.8000.2" }, { "model": "mms-ease", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "11.8000.1" }, { "model": "mms-ease", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "11.3000.3" }, { "model": "mms-ease", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "11.2000.2" }, { "model": "ax-s4 iccp", "scope": "ne", "trust": 0.3, "vendor": "sisco", "version": "6.0200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "BID", "id": "95022" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sisco:mms-ease_firmware:11.2000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sisco:mms-ease:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sisco:ax-s4_iccp_firmware:6.0000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sisco:ax-s4_iccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6574" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jerzy Kramarz of Portcullis.", "sources": [ { "db": "BID", "id": "95022" } ], "trust": 0.3 }, "cve": "CVE-2015-6574", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6574", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-13114", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84535", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6574", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6574", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-13114", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-530", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84535", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-6574", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "VULHUB", "id": "VHN-84535" }, { "db": "VULMON", "id": "CVE-2015-6574" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet. (CPU consumption of resources ) It may be in a state. SISCOMMS-EASE and AX-S4ICCP are products of SISCO Corporation of the United States. The former is a set of C language programming interface (API) for MMS (manufacturing message specification), and the latter is a set of data sharing software. SNAP-LiteUtility is one of the data mining and analysis components. There are security vulnerabilities in the SNAP-LiteUtility component V3.2000 in the SISCOMMS-EASE and AX-S4ICCP products. SISCO SNAP-Lite Utility is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to cause the application to enter an infinite loop and consume excessive CPU resources, resulting in denial-of-service conditions. \nSISCO SNAP-Lite Utility 3.2000 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "BID", "id": "95022" }, { "db": "VULHUB", "id": "VHN-84535" }, { "db": "VULMON", "id": "CVE-2015-6574" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6574", "trust": 4.3 }, { "db": "BID", "id": "95022", "trust": 2.7 }, { "db": "SIEMENS", "id": "SSA-223771", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU91561630", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-22-349-21", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-007311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-530", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-13114", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-84535", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-22-349-14", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-6574", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "VULHUB", "id": "VHN-84535" }, { "db": "VULMON", "id": "CVE-2015-6574" }, { "db": "BID", "id": "95022" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "id": "VAR-201612-0252", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "VULHUB", "id": "VHN-84535" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" } ] }, "last_update_date": "2023-12-18T10:47:59.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Vulnerability\u00a0Disclosure\u00a0for\u00a0CVE-2015-6574", "trust": 0.8, "url": "https://www.sisconet.com/wp-content/uploads/2016/04/secnote_cve-2015-6574-portcullis-20160426.pdf" }, { "title": "Patch for SISCOMMS-EASE and AX-S4ICCP Denial of Service Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/86585" }, { "title": "SISCO MMS-EASE and AX-S4 ICCP Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=66459" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.1 }, { "problemtype": "resource management issues (CWE-399) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84535" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://www.sisconet.com/wp-content/uploads/2016/04/secnote_cve-2015-6574-portcullis-20160426.pdf" }, { "trust": 2.1, "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/95022" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91561630/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6574" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21" }, { "trust": 0.3, "url": "http://www.sisconet.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-14" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "VULHUB", "id": "VHN-84535" }, { "db": "VULMON", "id": "CVE-2015-6574" }, { "db": "BID", "id": "95022" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-13114" }, { "db": "VULHUB", "id": "VHN-84535" }, { "db": "VULMON", "id": "CVE-2015-6574" }, { "db": "BID", "id": "95022" }, { "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "db": "NVD", "id": "CVE-2015-6574" }, { "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2016-13114" }, { "date": "2016-12-15T00:00:00", "db": "VULHUB", "id": "VHN-84535" }, { "date": "2016-12-15T00:00:00", "db": "VULMON", "id": "CVE-2015-6574" }, { "date": "2016-01-13T00:00:00", "db": "BID", "id": "95022" }, { "date": "2017-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "date": "2016-12-15T22:59:00.413000", "db": "NVD", "id": "CVE-2015-6574" }, { "date": "2016-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-27T00:00:00", "db": "CNVD", "id": "CNVD-2016-13114" }, { "date": "2022-12-13T00:00:00", "db": "VULHUB", "id": "VHN-84535" }, { "date": "2022-12-13T00:00:00", "db": "VULMON", "id": "CVE-2015-6574" }, { "date": "2017-01-12T02:04:00", "db": "BID", "id": "95022" }, { "date": "2022-12-19T08:21:00", "db": "JVNDB", "id": "JVNDB-2015-007311" }, { "date": "2022-12-13T12:15:17.873000", "db": "NVD", "id": "CVE-2015-6574" }, { "date": "2022-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-530" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific \u00a0SISCO\u00a0MMS-EASE\u00a0 and \u00a0AX-S4\u00a0ICCP\u00a0 of the product \u00a0SNAP\u00a0Lite\u00a0 Denial of service in components \u00a0(DoS)\u00a0 Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-530" } ], "trust": 0.6 } }
gsd-2015-6574
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-6574", "description": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.", "id": "GSD-2015-6574" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-6574" ], "details": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.", "id": "GSD-2015-6574", "modified": "2023-12-13T01:20:04.241658Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "95022", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95022" }, { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/", "refsource": "MISC", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/" }, { "name": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf", "refsource": "CONFIRM", "url": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sisco:mms-ease_firmware:11.2000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sisco:mms-ease:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sisco:ax-s4_iccp_firmware:6.0000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:sisco:ax-s4_iccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6574" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf" }, { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/" }, { "name": "95022", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/95022" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-12-13T12:15Z", "publishedDate": "2016-12-15T22:59Z" } } }
ghsa-qr78-j7cr-m294
Vulnerability from github
The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
{ "affected": [], "aliases": [ "CVE-2015-6574" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-12-15T22:59:00Z", "severity": "HIGH" }, "details": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.", "id": "GHSA-qr78-j7cr-m294", "modified": "2022-05-17T03:17:56Z", "published": "2022-05-17T03:17:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6574" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" }, { "type": "WEB", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574" }, { "type": "WEB", "url": "https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/95022" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
icsa-22-349-14
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Vera Mens" ], "organization": "Claroty", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow attackers to cause a denial-of-service condition on affected SIPROTEC 5 devices.", "title": "Risk evaluation" }, { "category": "other", "text": " Multiple Sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-223771: SISCO Stack Vulnerability in SIPROTEC 5 Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-223771.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-14 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-14.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-14 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-14" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-223771: SISCO Stack Vulnerability in SIPROTEC 5 Devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" }, { "category": "external", "summary": "SSA-223771: SISCO Stack Vulnerability in SIPROTEC 5 Devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-223771.txt" } ], "title": "Siemens SISCO MMS-EASE Third Party Component", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-14", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 6MD85 (CP200)", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIPROTEC 5 6MD85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 6MD85 (CP300)", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SIPROTEC 5 6MD85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 6MD86 (CP200)", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SIPROTEC 5 6MD86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 6MD86 (CP300)", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SIPROTEC 5 6MD86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.80", "product": { "name": "SIPROTEC 5 6MD89 (CP300)", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "SIPROTEC 5 6MD89 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.80", "product": { "name": "SIPROTEC 5 7KE85 (CP200)", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "SIPROTEC 5 7KE85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.80", "product": { "name": "SIPROTEC 5 7KE85 (CP300)", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "SIPROTEC 5 7KE85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA82 (CP100)", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA84 (CP200)", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA84 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA86 (CP200)", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA86 (CP300)", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA87 (CP200)", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA87 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SA87 (CP300)", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "SIPROTEC 5 7SA87 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD82 (CP100)", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD84 (CP200)", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD84 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD86 (CP200)", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD86 (CP300)", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD87 (CP200)", "product_id": "CSAFPID-00018" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD87 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SD87 (CP300)", "product_id": "CSAFPID-00019" } } ], "category": "product_name", "name": "SIPROTEC 5 7SD87 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ81 (CP100)", "product_id": "CSAFPID-00020" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ81 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ82 (CP100)", "product_id": "CSAFPID-00021" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ85 (CP200)", "product_id": "CSAFPID-00022" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ85 (CP300)", "product_id": "CSAFPID-00023" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ86 (CP200)", "product_id": "CSAFPID-00024" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SJ86 (CP300)", "product_id": "CSAFPID-00025" } } ], "category": "product_name", "name": "SIPROTEC 5 7SJ86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SK82 (CP100)", "product_id": "CSAFPID-00026" } } ], "category": "product_name", "name": "SIPROTEC 5 7SK82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SK85 (CP200)", "product_id": "CSAFPID-00027" } } ], "category": "product_name", "name": "SIPROTEC 5 7SK85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SK85 (CP300)", "product_id": "CSAFPID-00028" } } ], "category": "product_name", "name": "SIPROTEC 5 7SK85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SL82 (CP100)", "product_id": "CSAFPID-00029" } } ], "category": "product_name", "name": "SIPROTEC 5 7SL82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SL86 (CP200)", "product_id": "CSAFPID-00030" } } ], "category": "product_name", "name": "SIPROTEC 5 7SL86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SL86 (CP300)", "product_id": "CSAFPID-00031" } } ], "category": "product_name", "name": "SIPROTEC 5 7SL86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SL87 (CP200)", "product_id": "CSAFPID-00032" } } ], "category": "product_name", "name": "SIPROTEC 5 7SL87 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SL87 (CP300)", "product_id": "CSAFPID-00033" } } ], "category": "product_name", "name": "SIPROTEC 5 7SL87 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SS85 (CP200)", "product_id": "CSAFPID-00034" } } ], "category": "product_name", "name": "SIPROTEC 5 7SS85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7SS85 (CP300)", "product_id": "CSAFPID-00035" } } ], "category": "product_name", "name": "SIPROTEC 5 7SS85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPROTEC 5 7ST85 (CP200)", "product_id": "CSAFPID-00036" } } ], "category": "product_name", "name": "SIPROTEC 5 7ST85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UM85 (CP300)", "product_id": "CSAFPID-00037" } } ], "category": "product_name", "name": "SIPROTEC 5 7UM85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT82 (CP100)", "product_id": "CSAFPID-00038" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT82 (CP100)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT85 (CP200)", "product_id": "CSAFPID-00039" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT85 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT85 (CP300)", "product_id": "CSAFPID-00040" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT86 (CP200)", "product_id": "CSAFPID-00041" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT86 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT86 (CP300)", "product_id": "CSAFPID-00042" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT86 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT87 (CP200)", "product_id": "CSAFPID-00043" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT87 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7UT87 (CP300)", "product_id": "CSAFPID-00044" } } ], "category": "product_name", "name": "SIPROTEC 5 7UT87 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.80", "product": { "name": "SIPROTEC 5 7VE85 (CP300)", "product_id": "CSAFPID-00045" } } ], "category": "product_name", "name": "SIPROTEC 5 7VE85 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7VK87 (CP200)", "product_id": "CSAFPID-00046" } } ], "category": "product_name", "name": "SIPROTEC 5 7VK87 (CP200)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 7VK87 (CP300)", "product_id": "CSAFPID-00047" } } ], "category": "product_name", "name": "SIPROTEC 5 7VK87 (CP300)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 Communication Module ETH-BA-2EL", "product_id": "CSAFPID-00048" } } ], "category": "product_name", "name": "SIPROTEC 5 Communication Module ETH-BA-2EL" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V7.58", "product": { "name": "SIPROTEC 5 Communication Module ETH-BB-2FO", "product_id": "CSAFPID-00049" } } ], "category": "product_name", "name": "SIPROTEC 5 Communication Module ETH-BB-2FO" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-6574", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049" ] }, "remediations": [ { "category": "mitigation", "details": "Disable IEC 61850 communications on the affected port of the device", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049" ] }, { "category": "mitigation", "details": "Restrict access to port 102/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-00036" ] }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00048", "CSAFPID-00049" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109740816/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757428/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00046", "CSAFPID-00047" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757433/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109751934/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757434/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00034", "CSAFPID-00035" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757429/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757438/" }, { "category": "vendor_fix", "details": "Update to V7.80 or later version", "product_ids": [ "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757430/" }, { "category": "vendor_fix", "details": "Update to V7.58 or later version", "product_ids": [ "CSAFPID-00037" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757431/" }, { "category": "vendor_fix", "details": "Update to V7.80 or later version", "product_ids": [ "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109742950/" }, { "category": "vendor_fix", "details": "Update to V7.80 or later version", "product_ids": [ "CSAFPID-00045" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109749865/" }, { "category": "mitigation", "details": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid\u0027s reliability can thus be minimized by virtue of the grid design.\nSiemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. \nAs a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.\n\nRecommended security guidelines can be found at:\n\nhttps://www.siemens.com/gridsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00042", "CSAFPID-00043", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049" ] } ], "title": "CVE-2015-6574" } ] }
wid-sec-w-2022-2294
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "SIPROTEC ist eine Serie von Netzschutzger\u00e4ten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Siemens SIPROTEC ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2294 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2294.json" }, { "category": "self", "summary": "WID-SEC-2022-2294 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2294" }, { "category": "external", "summary": "Siemens Security Advisory by Siemens ProductCERT vom 2022-12-12", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-552874.pdf" }, { "category": "external", "summary": "Siemens Security Advisory by Siemens ProductCERT vom 2022-12-12", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf" } ], "source_lang": "en-US", "title": "Siemens SIPROTEC: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2022-12-12T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:06:10.038+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2294", "initial_release_date": "2022-12-12T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-12T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Siemens SIPROTEC 5", "product": { "name": "Siemens SIPROTEC 5", "product_id": "T025552", "product_identification_helper": { "cpe": "cpe:/h:siemens:siprotec:5" } } } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-45044", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Siemens SIPROTEC. Betroffene Ger\u00e4te schr\u00e4nken sichere, vom Client initiierte Neuverhandlungen innerhalb der SSL- und TLS-Protokolle nicht richtig ein. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service auf den Ports 443/tcp und 4443/tcp zu erzeugen." } ], "product_status": { "known_affected": [ "T025552" ] }, "release_date": "2022-12-12T23:00:00Z", "title": "CVE-2022-45044" }, { "cve": "CVE-2015-6574", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Siemens SIPROTEC. Diese bsteht in der SNAP Lite Komponente in bestimmten SISCO MMS-EASE and AX-S4 ICCP Produkten. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T025552" ] }, "release_date": "2022-12-12T23:00:00Z", "title": "CVE-2015-6574" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.