ID CVE-2018-4854
Summary A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
References
Vulnerable Configurations
  • cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*
    cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*
  • cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*
    cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 09-10-2019 - 23:41)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 104672
confirm https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf
Last major update 09-10-2019 - 23:41
Published 03-07-2018 - 14:29
Last modified 09-10-2019 - 23:41
Back to Top