var-201806-1777
Vulnerability from variot
A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request. plural Siemens The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). The SCALANCE X-204RNA Industrial Ethernet network access point enables the connection of non-PRP terminal devices. The RUGGEDDCOM WiMAX product line offers a dedicated wireless WAN solution. The RFID 181-EIP is an RFID communication module for Ethernet/IP that connects two serial SIMATIC identification readers to an Ethernet/IP scanner. The SIMATIC RF182C is an RFID communication module for Ethernet TCP/IP and XML for connecting two serial SIMAITC identification readers to a PC or other programmable device that can communicate via Ethernet TCP/IP and XML. Multiple SIEMENS product heap overflow vulnerabilities. An attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens RFID 181-EIP, etc. are all products of Germany's Siemens (Siemens). SCALANCE X-200 is an industrial grade Ethernet switch product. The following products and versions are affected: Siemens RFID 181-EIP; RUGGEDCOM WiMAX Version 4.4, Version 4.5; SCALANCE X-200 up to 5.2.3; SCALANCE X-200 IRT up to 5.4.1; SCALANCE X-204RNA; SCALANCE X- 300; SCALANCE X408; SCALANCE X414; SIMATIC RF182C
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201806-1777", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruggedcom wimax", "scope": "eq", "trust": 2.7, "vendor": "siemens", "version": "4.5" }, { "model": "ruggedcom wimax", "scope": "eq", "trust": 2.7, "vendor": "siemens", "version": "4.4" }, { "model": "scalance x200", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "5.2.3" }, { "model": "scalance x300", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "rfid 181-eip", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "scalance x204rna", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "scalance x408", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic rf182c", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "scalance x414", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "rfid 181-eip", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic rf182c", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance x200irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.4.1" }, { "model": "scalance x-300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200 irt", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.4.1" }, { "model": "scalance x204rna", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x408", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x414", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x408" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x414" }, { "model": "scalance irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200\u003c5.4.1" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200\u003c5.2.3" }, { "model": "ruggedcom wimax", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.4" }, { "model": "ruggedcom wimax", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.5" }, { "model": "scalance x-204rna", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-300" }, { "model": "scalance x200irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.1.0" }, { "model": "scalance x200irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.0.0" }, { "model": "simatic rf182c", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4140" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4080" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-3000" }, { "model": "scalance x-204rna", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-2000" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-2000" }, { "model": "rfid 181-eip", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance irt", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x-2005.4.1" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x-2005.2.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "rfid 181 eip", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ruggedcom wimax", "version": "4.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ruggedcom wimax", "version": "4.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200irt", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x204rna", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x408", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x414", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf182c", "version": null } ], "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "BID", "id": "104482" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:rfid_181-eip_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:rfid_181-eip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_wimax:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x200irt_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x200irt:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x204rna_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x300_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x408_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x414_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x414:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_rf182c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_rf182c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-4833" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dr. Ang Cui and Joseph Pantoga from Red Balloon", "sources": [ { "db": "BID", "id": "104482" } ], "trust": 0.3 }, "cve": "CVE-2018-4833", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-4833", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.2, "id": "CNVD-2018-11400", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.2, "id": "e2f3a541-39ab-11e9-815a-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-134864", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-4833", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-4833", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-11400", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201806-876", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-134864", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "VULHUB", "id": "VHN-134864" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.4.1), SCALANCE X-200RNA switch family (All versions \u003c V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions \u003c V4.1.3), SCALANCE X408 (All versions \u003c V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client\u0027s DHCP request. plural Siemens The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). The SCALANCE X-204RNA Industrial Ethernet network access point enables the connection of non-PRP terminal devices. The RUGGEDDCOM WiMAX product line offers a dedicated wireless WAN solution. The RFID 181-EIP is an RFID communication module for Ethernet/IP that connects two serial SIMATIC identification readers to an Ethernet/IP scanner. The SIMATIC RF182C is an RFID communication module for Ethernet TCP/IP and XML for connecting two serial SIMAITC identification readers to a PC or other programmable device that can communicate via Ethernet TCP/IP and XML. Multiple SIEMENS product heap overflow vulnerabilities. \nAn attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens RFID 181-EIP, etc. are all products of Germany\u0027s Siemens (Siemens). SCALANCE X-200 is an industrial grade Ethernet switch product. The following products and versions are affected: Siemens RFID 181-EIP; RUGGEDCOM WiMAX Version 4.4, Version 4.5; SCALANCE X-200 up to 5.2.3; SCALANCE X-200 IRT up to 5.4.1; SCALANCE X-204RNA; SCALANCE X- 300; SCALANCE X408; SCALANCE X414; SIMATIC RF182C", "sources": [ { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "BID", "id": "104482" }, { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-134864" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-4833", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-181018", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-18-165-01", "trust": 1.7 }, { "db": "BID", "id": "104482", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2018-11400", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201806-876", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-006612", "trust": 0.8 }, { "db": "IVD", "id": "E2F3A541-39AB-11E9-815A-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-134864", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "VULHUB", "id": "VHN-134864" }, { "db": "BID", "id": "104482" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "id": "VAR-201806-1777", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "VULHUB", "id": "VHN-134864" } ], "trust": 1.49709596 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" } ] }, "last_update_date": "2023-12-18T13:43:40.506000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-181018", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf" }, { "title": "Patches for multiple SIEMENS product heap overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/131863" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80924" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-122", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-134864" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-165-01" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4833" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4833" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-18-165-01" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-18-165-01" }, { "trust": 0.3, "url": "http://www.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "VULHUB", "id": "VHN-134864" }, { "db": "BID", "id": "104482" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-11400" }, { "db": "VULHUB", "id": "VHN-134864" }, { "db": "BID", "id": "104482" }, { "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "db": "NVD", "id": "CVE-2018-4833" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-13T00:00:00", "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "date": "2018-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2018-11400" }, { "date": "2018-06-14T00:00:00", "db": "VULHUB", "id": "VHN-134864" }, { "date": "2018-06-14T00:00:00", "db": "BID", "id": "104482" }, { "date": "2018-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "date": "2018-06-14T16:29:00.333000", "db": "NVD", "id": "CVE-2018-4833" }, { "date": "2018-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2018-11400" }, { "date": "2020-01-16T00:00:00", "db": "VULHUB", "id": "VHN-134864" }, { "date": "2018-06-14T00:00:00", "db": "BID", "id": "104482" }, { "date": "2018-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006612" }, { "date": "2020-12-14T21:15:13.660000", "db": "NVD", "id": "CVE-2018-4833" }, { "date": "2020-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-876" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201806-876" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "e2f3a541-39ab-11e9-815a-000c29342cb1" }, { "db": "BID", "id": "104482" }, { "db": "CNNVD", "id": "CNNVD-201806-876" } ], "trust": 1.1 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.