icsma-17-215-01
Vulnerability from csaf_cisa
Published
2017-08-03 00:00
Modified
2017-08-03 00:00
Summary
ICSMA-17-215-01_Siemens Molecular Imaging Vulnerabilities
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-17-215-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsma-17-215-01.json" }, { "category": "self", "summary": "ICS Advisory ICSMA-17-215-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-17-215-01" } ], "title": "ICSMA-17-215-01_Siemens Molecular Imaging Vulnerabilities", "tracking": { "current_release_date": "2017-08-03T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSMA-17-215-01", "initial_release_date": "2017-08-03T00:00:00.000000Z", "revision_history": [ { "date": "2017-08-03T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-17-215-01 Siemens Molecular Imaging Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Siemens SPECT Workplaces/Symbia.net: All Windows XP-based versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Siemens SPECT Workplaces/Symbia.net Windows XP-Based" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Siemens SPECT/CT Systems: All Windows XP-based versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Siemens SPECT/CT Systems Windows XP-Based" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Siemens SPECT Systems: All Windows XP-based versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Siemens SPECT Systems Windows XP-Based" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Siemens PET/CT Systems: All Windows XP-based versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Siemens PET/CT Systems Windows XP-Based" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-4250", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An unauthenticated remote attacker could execute arbitrary code via a specially crafted remote procedure call (RPC) request sent to the server service of affected Microsoft Windows systems.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "In addition, Siemens recommends:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2008-4250" }, { "cve": "CVE-2017-7269", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An unauthenticated remote attacker could execute arbitrary code with the permissions of the web server by sending a specially crafted HTTP request to the WebDAV service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "In addition, Siemens recommends:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2017-7269" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.