var-201607-0465
Vulnerability from variot
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens' process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector; the PCS 7 system is a seamlessly integrated automation solution for all industrial applications. field. A remote code execution vulnerability exists in SIMATIC WinCC/PCS 7/WinCC Runtime Professional. Multiple Siemens Products are prone to a remote code-execution vulnerability. An attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens SIMATIC WinCC, etc. are all industrial automation products of Siemens (Siemens) in Germany
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201607-0465", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic openpcs 7", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "simatic batch", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "simatic openpcs 7", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "simatic wincc", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "7.4" }, { "model": "simatic wincc", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "7.3" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "78.0" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "78.1" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "78.2" }, { "model": "simatic wincc sp", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "7.03" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "7.2" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "7.4" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "7.3" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "7.4 update 1" }, { "model": "simatic wincc", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "7.4" }, { "model": "simatic pcs sp4", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7\u003c=7.1" }, { "model": "simatic wincc runtime professional sp update", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v1319" }, { "model": "simatic wincc sp", "scope": "lte", "trust": 0.6, "vendor": "siemens", "version": "\u003c=7.02" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.3x\u003c7.310" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.4x\u003c7.41" }, { "model": "simatic openpcs 7", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "8.1" }, { "model": "simatic batch", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.1" }, { "model": "simatic openpcs 7", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "simatic wincc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "simatic openpcs 7", "version": "*" }, { "model": "simatic wincc runtime professional sp1 upd2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic wincc runtime professional", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.32" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.31" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.29" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.28" }, { "model": "simatic wincc update", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.21" }, { "model": "simatic wincc upd4", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.2" }, { "model": "simatic wincc upd11", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.2" }, { "model": "simatic wincc sp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.02" }, { "model": "simatic pcs sp4", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "77.1" }, { "model": "simatic wincc runtime professional sp update", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1319" }, { "model": "simatic wincc update", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "7.41" }, { "model": "simatic wincc update", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "7.310" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic batch", "version": "*" } ], "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "BID", "id": "92112" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:sp1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-5743" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sergey Temnikov and Vladimir Dashchenko, Critical Infrastructure Defence\nTeam, Kaspersky Lab.", "sources": [ { "db": "BID", "id": "92112" } ], "trust": 0.3 }, "cve": "CVE-2016-5743", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-5743", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-05346", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "649ab73e-2968-450b-b5d3-31e462571302", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-94562", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-5743", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-5743", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2016-05346", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201607-904", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-94562", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "VULHUB", "id": "VHN-94562" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens\u0027 process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector; the PCS 7 system is a seamlessly integrated automation solution for all industrial applications. field. A remote code execution vulnerability exists in SIMATIC WinCC/PCS 7/WinCC Runtime Professional. Multiple Siemens Products are prone to a remote code-execution vulnerability. \nAn attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens SIMATIC WinCC, etc. are all industrial automation products of Siemens (Siemens) in Germany", "sources": [ { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "BID", "id": "92112" }, { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "VULHUB", "id": "VHN-94562" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-5743", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-378531", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-16-208-01", "trust": 2.2 }, { "db": "BID", "id": "92112", "trust": 2.0 }, { "db": "SECTRACK", "id": "1036441", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-201607-904", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2016-05346", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-004095", "trust": 0.8 }, { "db": "IVD", "id": "649AB73E-2968-450B-B5D3-31E462571302", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-94562", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "VULHUB", "id": "VHN-94562" }, { "db": "BID", "id": "92112" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "id": "VAR-201607-0465", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "VULHUB", "id": "VHN-94562" } ], "trust": 1.5460884383333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" } ] }, "last_update_date": "2023-12-18T13:14:28.684000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-378531", "trust": 0.8, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf" }, { "title": "Patch for remote code execution vulnerability in SIMATIC WinCC/PCS 7/WinCCRuntime Professional", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/79586" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63264" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-94562" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf" }, { "trust": 2.2, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-208-01" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/92112" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036441" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5743" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5743" }, { "trust": 0.3, "url": "http://www.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "VULHUB", "id": "VHN-94562" }, { "db": "BID", "id": "92112" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNVD", "id": "CNVD-2016-05346" }, { "db": "VULHUB", "id": "VHN-94562" }, { "db": "BID", "id": "92112" }, { "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "db": "NVD", "id": "CVE-2016-5743" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-25T00:00:00", "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "date": "2016-07-25T00:00:00", "db": "CNVD", "id": "CNVD-2016-05346" }, { "date": "2016-07-22T00:00:00", "db": "VULHUB", "id": "VHN-94562" }, { "date": "2016-07-22T00:00:00", "db": "BID", "id": "92112" }, { "date": "2016-08-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "date": "2016-07-22T15:59:00.147000", "db": "NVD", "id": "CVE-2016-5743" }, { "date": "2016-07-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-25T00:00:00", "db": "CNVD", "id": "CNVD-2016-05346" }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-94562" }, { "date": "2016-07-22T00:00:00", "db": "BID", "id": "92112" }, { "date": "2016-08-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004095" }, { "date": "2016-11-28T20:29:09.843000", "db": "NVD", "id": "CVE-2016-5743" }, { "date": "2016-07-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201607-904" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201607-904" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens SIMATIC Vulnerabilities in products that allow arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004095" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "649ab73e-2968-450b-b5d3-31e462571302" }, { "db": "CNNVD", "id": "CNNVD-201607-904" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.