var-202201-0855
Vulnerability from variot
A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information. Multiple Siemens products contain an input validation vulnerability.Information may be obtained. SIPROTEC 5 devices offer a range of functions for integrated protection, control, measurement and automation of substations and other fields of application.
An information disclosure vulnerability exists in Siemens SIPROTEC 5, which can be exploited by attackers to read device information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0855", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "siprotec 6md85 devices", "scope": "eq", "trust": 1.2, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "6md89", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sa87", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sl82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7st85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "6mu85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sd82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sj86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "6md85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ut85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ut87", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7um85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ut82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sx85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sl86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7vk87", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sx800", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sj85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sl87", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sa86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sj82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ut86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sk85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sa82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ke85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "6md86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sd86", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sj81", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ve85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sd87", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7ss85", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "7sk82", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.83" }, { "model": "siprotec 5 7sa86", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 6md89", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 7sd82", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 6md85", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 7sd86", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 7ke85", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 7sa87", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 6md86", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 6mu85", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 5 7sa82", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siprotec 7sx85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7um85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ut82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ut85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ut86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ut87 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ve85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7vk87 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec compact 7sx800 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 6md86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 6md89 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 6mu85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ke85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sa82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sa86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sa87 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sd82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sd86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sd87 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sj81 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sj82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sj85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sj86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sk82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sk85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sl82 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sl86 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7sl87 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7ss85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" }, { "model": "siprotec 7st85 devices", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5\u003c8.83" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6md85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6md86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6md89_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6mu85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6mu85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ke85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ke85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sa82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sa86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sa87_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sd82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sd86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sd87_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sj81_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sj81:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sj82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sj85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sj86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sk82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sk85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sl82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sl86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sl87_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ss85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ss85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7st85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7st85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sx800_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sx800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7sx85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7sx85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7um85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ut82_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ut85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ut86_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ut87_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7ve85_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:7vk87_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-41769" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported this vulnerability to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-870" } ], "trust": 0.6 }, "cve": "CVE-2021-41769", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-41769", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2022-02748", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-41769", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-41769", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-02748", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-870", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" }, { "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions \u003c V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions \u003c V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions \u003c V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information. Multiple Siemens products contain an input validation vulnerability.Information may be obtained. SIPROTEC 5 devices offer a range of functions for integrated protection, control, measurement and automation of substations and other fields of application. \n\r\n\r\nAn information disclosure vulnerability exists in Siemens SIPROTEC 5, which can be exploited by attackers to read device information", "sources": [ { "db": "NVD", "id": "CVE-2021-41769" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "CNVD", "id": "CNVD-2022-02748" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41769", "trust": 3.8 }, { "db": "SIEMENS", "id": "SSA-439673", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-22-013-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU98508242", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-003210", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-02748", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022011802", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-870", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" }, { "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "id": "VAR-202201-0855", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" } ], "trust": 1.3387096780645162 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" } ] }, "last_update_date": "2023-12-18T11:43:53.217000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-439673", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf" }, { "title": "Patch for Siemens SIPROTEC 5 Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/313041" }, { "title": "Siemens SIPROTEC 5 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178996" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41769" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98508242/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-013-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022011802" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-013-04" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" }, { "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-02748" }, { "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "db": "NVD", "id": "CVE-2021-41769" }, { "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-02748" }, { "date": "2023-02-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "date": "2022-01-11T12:15:10.037000", "db": "NVD", "id": "CVE-2021-41769" }, { "date": "2022-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-18T00:00:00", "db": "CNVD", "id": "CNVD-2022-02748" }, { "date": "2023-02-10T06:27:00", "db": "JVNDB", "id": "JVNDB-2022-003210" }, { "date": "2022-01-19T16:49:32.947000", "db": "NVD", "id": "CVE-2021-41769" }, { "date": "2022-02-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-870" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-870" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003210" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-870" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.