var-201812-0341
Vulnerability from variot
A vulnerability has been identified in SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (Versions V7.1 < V7.1 Upd3), SIMATIC IT UA Discrete Manufacturing (Versions < V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.4). An attacker with network access to the installation could bypass the application-level authentication. In order to exploit the vulnerability, an attacker must obtain network access to an affected installation and must obtain a valid username to the system. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known. SIMATIC IT LMS , SIMATIC IT Production Suite , SIMATIC IT UA Discrete Manufacturing Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SIMATIC IT LMS is a line monitoring system for overall equipment performance (OEE). The SIMATIC IT Production Suite is a factory production management suite. This may aid in further attacks. # ICS Advisory (ICSA-18-317-07) ## Siemens SIMATIC IT Production Suite Original release date: November 13, 2018 Print Document Tweet Like Me Share ### Legal Notice All information products included in https://us-cert.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information..
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 1.1, "vendor": "siemens", "version": "2.3" }, { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "v2.4" }, { "model": "simatic it ua discrete manufacturing", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "v1.2" }, { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "v1.3" }, { "model": "simatic it production suite", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "v7.1" }, { "model": "simatic it line monitoring system", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "v2.3" }, { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "2.4" }, { "model": "simatic it lms", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic it ua discrete manufacturing", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "1.3" }, { "model": "simatic it production suite", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "7.1 upd3" }, { "model": "simatic it ua discrete manufacturing", "scope": "lte", "trust": 0.8, "vendor": "siemens", "version": "1.2 and earlier" }, { "model": "simatic it production suite", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "7.1" }, { "model": "simatic it lms all", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic it ua discrete manufacturing", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "2.4" }, { "model": "simatic it production suite upd3", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.1.*\u003c7.1" }, { "model": "simatic it production suite", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7.1" }, { "model": "simatic it production suite", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic it lms", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "telecontrol server basic", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.1" }, { "model": "simatic it ua discrete manufacturing", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.4" }, { "model": "simatic it production suite upd3", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "7.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it line monitoring system", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it production suite", "version": "v7.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it ua discrete manufacturing", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it ua discrete manufacturing", "version": "v1.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it ua discrete manufacturing", "version": "v2.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic it ua discrete manufacturing", "version": "v2.4" } ], "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "BID", "id": "105924" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_ua_discrete_manufacturing:v2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_ua_discrete_manufacturing:v1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_ua_discrete_manufacturing:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v1.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_production_suite:v7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_ua_discrete_manufacturing:v2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_it_line_monitoring_system:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-13804" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "105924" } ], "trust": 0.3 }, "cve": "CVE-2018-13804", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-13804", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2018-25912", "impactScore": 9.5, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "7d82d140-463f-11e9-9d7d-000c29342cb1", "impactScore": 9.5, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-123900", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-13804", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-13804", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-25912", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201811-484", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-123900", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "VULHUB", "id": "VHN-123900" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SIMATIC IT LMS (All versions), SIMATIC IT Production Suite (Versions V7.1 \u003c V7.1 Upd3), SIMATIC IT UA Discrete Manufacturing (Versions \u003c V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.2), SIMATIC IT UA Discrete Manufacturing (Versions V1.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.3), SIMATIC IT UA Discrete Manufacturing (Versions V2.4). An attacker with network access to the installation could bypass the application-level authentication. In order to exploit the vulnerability, an attacker must obtain network access to an affected installation and must obtain a valid username to the system. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known. SIMATIC IT LMS , SIMATIC IT Production Suite , SIMATIC IT UA Discrete Manufacturing Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SIMATIC IT LMS is a line monitoring system for overall equipment performance (OEE). The SIMATIC IT Production Suite is a factory production management suite. This may aid in further attacks. # ICS Advisory (ICSA-18-317-07) ## Siemens SIMATIC IT Production Suite Original release date: November 13, 2018 [Print Document](javascript:window.print\\(\\);) [Tweet](https://twitter.com/share?url=https%3A%2F%2Fus- cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-317-07) [Like Me](https://www.facebook.com/sharer.php?u=https%3A%2F%2Fus- cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-317-07) [Share](http://www.addthis.com/bookmark.php?url=https%3A%2F%2Fus- cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-317-07) ### Legal Notice All information products included in [https://us-cert.gov/ics](/ics) are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information..", "sources": [ { "db": "NVD", "id": "CVE-2018-13804" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "BID", "id": "105924" }, { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-123900" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-13804", "trust": 3.6 }, { "db": "BID", "id": "105924", "trust": 2.0 }, { "db": "ICS CERT", "id": "ICSA-18-317-07", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-886615", "trust": 1.7 }, { "db": "CNVD", "id": "CNVD-2018-25912", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201811-484", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-014497", "trust": 0.8 }, { "db": "IVD", "id": "7D82D140-463F-11E9-9D7D-000C29342CB1", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-98857", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-123900", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "VULHUB", "id": "VHN-123900" }, { "db": "BID", "id": "105924" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "id": "VAR-201812-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "VULHUB", "id": "VHN-123900" } ], "trust": 1.575 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" } ] }, "last_update_date": "2023-12-18T13:43:31.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-886615", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-886615.pdf" }, { "title": "Patch for Siemens SIMATIC IT LMS, SIMATIC IT Production Suite and SIMATIC IT UA Discrete Manufacturing Authorization Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/147647" }, { "title": "Siemens SIMATIC IT LMS , SIMATIC IT Production Suite and SIMATIC IT UA Discrete Manufacturing Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86885" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-123900" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-317-07" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105924" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-886615.pdf" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13804" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13804" }, { "trust": 0.3, "url": "http://www.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "VULHUB", "id": "VHN-123900" }, { "db": "BID", "id": "105924" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25912" }, { "db": "VULHUB", "id": "VHN-123900" }, { "db": "BID", "id": "105924" }, { "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "db": "NVD", "id": "CVE-2018-13804" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-20T00:00:00", "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "date": "2018-12-20T00:00:00", "db": "CNVD", "id": "CNVD-2018-25912" }, { "date": "2018-12-13T00:00:00", "db": "VULHUB", "id": "VHN-123900" }, { "date": "2018-11-13T00:00:00", "db": "BID", "id": "105924" }, { "date": "2019-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "date": "2018-12-13T16:29:00.210000", "db": "NVD", "id": "CVE-2018-13804" }, { "date": "2018-11-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-20T00:00:00", "db": "CNVD", "id": "CNVD-2018-25912" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-123900" }, { "date": "2018-11-13T00:00:00", "db": "BID", "id": "105924" }, { "date": "2019-03-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014497" }, { "date": "2019-10-09T23:34:32.683000", "db": "NVD", "id": "CVE-2018-13804" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-484" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201811-484" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural SIMATIC Access control vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014497" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Access control error", "sources": [ { "db": "IVD", "id": "7d82d140-463f-11e9-9d7d-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201811-484" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.