VAR-201310-0390
Vulnerability from variot - Updated: 2023-12-18 13:20The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. SCALANCE X-200 and X-200IRT series switches are prone to an authentication-bypass vulnerability. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the affected device. The following products are affected. SCALANCE X-200 running firmware versions prior to 4.5.0 SCALANCE X-200IRT running firmware versions prior to 5.1.0
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201310-0390",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "scalance x-200 series",
"scope": "eq",
"trust": 1.6,
"vendor": "siemens",
"version": "4.3"
},
{
"model": "scalance x-200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "4.4"
},
{
"model": "scalance x-200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "5.0.1"
},
{
"model": "scalance x-200irt",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-200",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-200",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-200 series",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "4.5.0 (scalance x-200)"
},
{
"model": "scalance x-200 series",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "5.1.0 (scalance x-200irt)"
},
{
"model": "scalance x-200irt",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "x-2004.4.9"
},
{
"model": "scalance x-200irt",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5.0.9"
},
{
"model": "scalance x-200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5.0.1"
},
{
"model": "scalance x-200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "4.4"
},
{
"model": "scalance x-200irt",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "scalance",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "x-2000"
},
{
"model": "scalance x-200irt",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "5.1.2"
},
{
"model": "scalance x-200irt",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "5.1"
},
{
"model": "scalance",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "x-2004.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "scalance x 200 series",
"version": "5.0.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "scalance x 200",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "scalance x 200 series",
"version": "4.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "scalance x 200irt",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "scalance x 200 series",
"version": "4.3"
}
],
"sources": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "BID",
"id": "62762"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.0.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200irt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-5944"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Eireann Leverett of IOActive",
"sources": [
{
"db": "BID",
"id": "62762"
}
],
"trust": 0.3
},
"cve": "CVE-2013-5944",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-5944",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-13553",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "9e35be88-2352-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-65946",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-5944",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-13553",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201310-059",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-65946",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2013-5944",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. SCALANCE X-200 and X-200IRT series switches are prone to an authentication-bypass vulnerability. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the affected device. \nThe following products are affected. \nSCALANCE X-200 running firmware versions prior to 4.5.0\nSCALANCE X-200IRT running firmware versions prior to 5.1.0",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "BID",
"id": "62762"
},
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-5944",
"trust": 3.7
},
{
"db": "SIEMENS",
"id": "SSA-176087",
"trust": 2.7
},
{
"db": "BID",
"id": "62762",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-13553",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482",
"trust": 0.8
},
{
"db": "IVD",
"id": "9E35BE88-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-89659",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-65946",
"trust": 0.1
},
{
"db": "ICS CERT",
"id": "ICSA-13-274-01",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2013-5944",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"db": "BID",
"id": "62762"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"id": "VAR-201310-0390",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULHUB",
"id": "VHN-65946"
}
],
"trust": 1.4816919199999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
}
]
},
"last_update_date": "2023-12-18T13:20:05.009000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-176087",
"trust": 0.8,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-176087.pdf"
},
{
"title": "Patch for unclear management access vulnerability on the WEB interface of the Siemens SCALANCE X-200 switch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/40012"
},
{
"title": "Siemens Scalance X-200 Switch unauthorized access vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109052"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=44f98d989f2a58ed7cb2e4b6335cb180"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-176087.pdf"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-176087.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5944"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5944"
},
{
"trust": 0.3,
"url": "http://subscriber.communications.siemens.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31114"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-13-274-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"db": "BID",
"id": "62762"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"db": "VULHUB",
"id": "VHN-65946"
},
{
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"db": "BID",
"id": "62762"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-10-10T00:00:00",
"db": "IVD",
"id": "9e35be88-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-10-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"date": "2013-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-65946"
},
{
"date": "2013-10-03T00:00:00",
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"date": "2013-10-01T00:00:00",
"db": "BID",
"id": "62762"
},
{
"date": "2013-10-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"date": "2013-10-03T11:04:43.773000",
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"date": "2013-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-10-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13553"
},
{
"date": "2020-02-10T00:00:00",
"db": "VULHUB",
"id": "VHN-65946"
},
{
"date": "2020-02-10T00:00:00",
"db": "VULMON",
"id": "CVE-2013-5944"
},
{
"date": "2013-10-01T00:00:00",
"db": "BID",
"id": "62762"
},
{
"date": "2013-10-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-004482"
},
{
"date": "2020-02-10T15:15:12.387000",
"db": "NVD",
"id": "CVE-2013-5944"
},
{
"date": "2020-02-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SCALANCE X-200 and X-200IRT Vulnerability to execute administrator actions in switch firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-004482"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201310-059"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.