Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-5469 (GCVE-0-2018-5469)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Hirschmann Automation and Control GmbH Classic Platform Switches |
Version: Hirschmann Automation and Control GmbH Classic Platform Switches |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103340", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103340" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Hirschmann Automation and Control GmbH Classic Platform Switches", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } ], "datePublic": "2018-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-10T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "103340", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103340" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches", "version": { "version_data": [ { "version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-307" } ] } ] }, "references": { "reference_data": [ { "name": "103340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103340" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-5469", "datePublished": "2018-03-06T21:00:00", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-08-05T05:33:44.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-5469\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-03-06T21:29:00.393\",\"lastModified\":\"2024-11-21T04:08:51.743\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema de restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de restricci\u00f3n indebida de autenticaci\u00f3n excesiva en la interfaz web que podr\u00eda permitir que un atacante se autentique mediante fuerza bruta.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA25D40E-1E3F-41AB-8BC9-0A364A211183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED7F69C-9D7E-4D3E-8FC8-046591B8F72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A389F6F0-D56E-49C9-B4AD-CCD8DD4A2450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49911A4F-A21E-491C-8A03-6E4144DE42D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738724A7-562C-4807-A317-B5C5428932AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA39FF33-6E6A-4691-9C40-560723CBFB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB971E8-2607-46BC-84C1-F3D34E44C3E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1460D64-8DE5-471B-A503-2D87892C79BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1981C282-9207-4868-9F23-6DD8807BB229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26E3E61-E84D-4800-BDF6-0B4A2F499363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA008C7-B4CD-4C34-AF56-ECD8C24DB505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C5D3E8-A3BB-44FB-A987-83FAD4CC9A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06C03EE-24A8-4ADE-9B14-5FAAD35E65DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2BF0F4-230F-44AA-85EE-28B8240B2ACF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD83F89-EB97-4B8F-9DC2-73B730A76EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A8048B-558C-4741-BD88-D2D3CF74CB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA8B637-D6A9-4DF4-824B-C53CA7A8ABEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B18896-D580-424F-9C4E-82E2EBAD844B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2178F642-0E69-43F0-8F8F-2C87C981DCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578326FE-F0FB-47EB-A44F-206BD251D2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BEFAE2-3CC3-4DCC-A8C3-9F8DB2B004D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F708D57-48A5-4F53-AB50-15F367358162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D218119-49DA-47D3-96E8-AD953B9A47C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA69C3A-0E18-4917-89C8-A7DA275533E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51E0C67-B998-4C68-84E7-2B38A93B6FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC13B1DA-0E50-4D07-91E6-E7A07A0E2069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A850722-6D89-4C42-B20D-407A8E7D9A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B98DD9-FB55-4AE5-90E9-10A4BCAA9F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"043062F8-E093-43D7-8509-63480874592D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACCC3ECF-51F0-4A7C-A43D-3E2D4E72D818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4A1209-27A8-4C95-BD40-C9AA727CFA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F15FC0F-489C-4D45-9BC8-F3F86E0A3AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2888785F-D3D7-41E9-A5C6-5D7ED53DE14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853F8602-9DCA-4801-89DB-840FECF6280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54DE1A99-1AA9-4A43-BD7C-3E22A2A5BA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738EB5DB-F9F0-4524-A22A-8A7950C27A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509B1762-6301-4A27-9D9B-B136F6AAB4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4F4DA6-0372-4AD2-BFC1-050017DEA887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15219A3B-F7E7-4CA9-8309-B67EA6966CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714290B-3E4E-4F33-B8A1-9A829785A898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7A4550-3156-41A7-BBF2-F8A4286758CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58196E57-6427-4173-9619-528F03CD5B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8322D0-3114-4492-9BF7-3E666CBE6611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9819AE5A-8C0D-4EE9-815A-B2769C83C380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B9C8AA-1E8A-4146-8EB6-1BE9C594B4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E497A2-AC8F-408A-85BE-65845498FB4C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B195204E-8B95-4BE1-B235-1E2FD95A44AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A9821B-8D5D-4A5F-AED5-74A0703529CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09A75E6D-B73E-45B7-8705-95208F235D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C99A74-7C85-4416-9E9C-3CBA79585736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"945DE3CE-B99F-4E03-BDD1-C23396DF50F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0BA8D9-D4ED-4CDE-8E3D-F6079899E0FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAE9CE3-0207-4314-8C4A-84A6AD3BF235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0D747D9-EDD2-4090-B32F-3C9822E4A56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC40955F-D5EB-4B31-A7D1-058E02C417FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C923E962-ECE4-4F23-91C3-5A617D52D4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D7ADAB-28A7-4D2B-8662-9E90EFCD8151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1893F2D7-F48D-411E-BB7C-B7AF2C44EFF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEFE82AD-A5F9-4072-8CBC-20BC6D1CD6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A497238D-1115-40E2-B043-EB896FED267D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39554286-44A3-4652-B669-DA14CD20B441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-e-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D64AA359-B1AF-417B-AA93-349E52A7966E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EE024D-162D-419F-A177-327BBF42BAFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-r-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CCBC08-CEDB-4461-80B8-9A8C7AC618B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5281211-E32D-412C-8689-82FC4549C40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D5198B-B500-4C91-8E0D-8B95B51B71BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A82CD8-A4A4-4157-91BB-8D6A2BBB0D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7115757B-7460-4B54-98E5-4F520DD56A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F39B9B-FAAC-43BE-9647-97D54FB52507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59AB7716-CEC7-4A27-8875-09253E9AC237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E597300-89BD-4200-965A-A486ABD7B4B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11DB049-5577-4B6E-897E-5C18C62B41D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2903B36-E3B5-4767-8075-859C00F2E402\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8386501-2E1F-401C-BFFA-6B53B6BFF8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1D3786-C6D0-4A17-AD47-0B182C6F7A04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E9F068-8B2C-4865-AE12-5AB4E8E1F946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1CE066-1223-458C-A543-1D142539FCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE8E9CE-EA78-43BF-9A6A-87D0352CF4DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC03833-B05B-4E56-9E58-072C850F3057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB9E695-1706-4D9D-8E10-212B75CD560D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF89542-FF92-4429-B314-4AFC765FDFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4792860A-8E90-40E5-985C-C1FB11588E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E815F4A6-9097-4ABE-88BD-5014BE6A5513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FEC97C-495B-40E8-BEDF-948EEC41752C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026D719B-4E41-4C32-B0E3-728A35A6706D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1FD6BEB-9943-42BB-B62E-5B3C91092B57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9129B33A-8EE8-4194-A5CD-E8049B99A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1A12E5-373D-441E-B04C-8F95F088B344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5B3B29-8E0D-488C-BB3B-EC0A8A3DBC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB3DCC1-63DE-4B99-894E-3F5C23437850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CDE07E-9970-421D-A148-896743C7DFCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7047E947-36E6-4A26-BC23-28C65B50C356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630F1410-FFB4-489B-9964-351145426399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEF8E02-FAA3-492F-BB1E-1FF4BDF4C608\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9093BA-0B42-4097-9A1A-84DE32DED2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD6950F-C91B-4627-A047-5122C04C04B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA3B0BE-5AFB-469D-A0D9-EAB0577595FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F4375F-CA06-4839-8CCB-9E9246DDEE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B5D6811-AD13-4C0A-99DB-7D4179757168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7070C13-DA62-4D85-A64F-5111A242A8EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8FB2BC-2BE3-4024-AD6A-A2BBA3B29493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E11B95-E12C-49BD-A312-CF1BF8118E7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88902682-B211-4736-B364-BEFDA768B4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1445388A-F752-4953-9F89-BE3660617B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28FF7C3E-5021-4C82-A238-041A1FD71201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431FC180-BCA1-4F98-8D18-A0CE08E10756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A26D3EC9-DFE5-4AD0-ADDF-6F508B6E3744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0063F51-2F98-4DE8-880C-D7076B0DCD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87074D73-9674-478E-9377-A9C6C523D2E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"875DC5B6-B977-42E7-8713-A9FD0C48F104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4C975-724F-426A-8056-6EE02B22F282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4596FAB-8105-441B-B3AC-EDAED7C7F735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64276F67-CEDA-4445-A337-79133794D592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5100DA61-83DD-4413-A8EC-20BEB30BA0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87F4DE6A-2688-4F1D-BEFA-BE932F637BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D281C363-DD4E-452B-ABCC-4EA336B17C37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D85D07B-2EBE-478E-B5FE-975EFD0AADE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2024F2-7CB2-40A2-B464-B4C3AA74104D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B207FE2-DE97-48E5-92DA-F936A679B08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58CBF64A-49BE-44D2-8381-05147A54FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063E67B4-2F80-4762-BEF2-B3A8897C0B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4918054-F180-48D4-B294-BA25074D2EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE08D58E-44A1-48A1-986E-D66FB728D60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA034B1A-CD20-4033-ADFB-BC7F13D23AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C971FE83-B5B2-4855-94AD-F8C4E844D204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E175432-5BCF-4402-8087-3A9F126A12C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB4580A2-26D9-469B-BCEB-F565D757902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068E6AEF-D20C-4D5D-9DF5-293DA5A42534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF21DEC7-DDDD-477A-957A-0FDD52522A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73D7F90-BD0C-4C6C-AAB0-A006AD2F6158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D967C151-6D54-4649-9019-03E8C501FCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BDA02A-B7E4-4217-9E56-01A88F944B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600871CF-FB70-48DC-8AD0-DFB2EC08A45F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E755EDB6-832D-42EA-91D7-FFD76443C336\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103340\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/103340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
ghsa-m538-hxpg-3fvh
Vulnerability from github
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.
{ "affected": [], "aliases": [ "CVE-2018-5469" ], "database_specific": { "cwe_ids": [ "CWE-307" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-06T21:29:00Z", "severity": "CRITICAL" }, "details": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.", "id": "GHSA-m538-hxpg-3fvh", "modified": "2022-05-13T01:32:06Z", "published": "2022-05-13T01:32:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5469" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103340" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-5469
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-5469", "description": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.", "id": "GSD-2018-5469" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-5469" ], "details": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.", "id": "GSD-2018-5469", "modified": "2023-12-13T01:22:40.659098Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches", "version": { "version_data": [ { "version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-307" } ] } ] }, "references": { "reference_data": [ { "name": "103340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103340" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5469" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-307" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "name": "103340", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:41Z", "publishedDate": "2018-03-06T21:29Z" } } }
icsa-18-065-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin", "Mikhail Tsvetkov", "Damir Zainullin" ], "organization": "Positive Technologies", "summary": "reporting these vulnerabilities to Belden" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Exploitable remotely/high skill level is needed to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "St. Louis, Missouri", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-065-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-065-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/" } ], "title": "Hirschmann Automation and Control GmbH Classic Platform Switches", "tracking": { "current_release_date": "2018-03-06T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-065-01", "initial_release_date": "2018-03-06T00:00:00.000000Z", "revision_history": [ { "date": "2018-03-06T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSB: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Classic Platform Switches RSB" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches OCTOPUS: all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Classic Platform Switches OCTOPUS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RS: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Classic Platform Switches RS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MS: all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Classic Platform Switches MS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH100: all versions", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Classic Platform Switches MACH100" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSR: all versions", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Classic Platform Switches RSR" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH1000: all versions", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Classic Platform Switches MACH1000" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH4000: all versions", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Classic Platform Switches MACH4000" } ], "category": "vendor", "name": "Hirschmann Automation and Control GmbH, Belden Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5465", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. CVE-2018-5465 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5465" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5467", "cwe": { "id": "CWE-598", "name": "Use of GET Request Method With Sensitive Query Strings" }, "notes": [ { "category": "summary", "text": "An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. CVE-2018-5467 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5467" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5471", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5471 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5461", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5461 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5461" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5469", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. CVE-2018-5469 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSA-18-065-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin", "Mikhail Tsvetkov", "Damir Zainullin" ], "organization": "Positive Technologies", "summary": "reporting these vulnerabilities to Belden" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Exploitable remotely/high skill level is needed to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "St. Louis, Missouri", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-065-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-065-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/" } ], "title": "Hirschmann Automation and Control GmbH Classic Platform Switches", "tracking": { "current_release_date": "2018-03-06T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-065-01", "initial_release_date": "2018-03-06T00:00:00.000000Z", "revision_history": [ { "date": "2018-03-06T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSB: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Classic Platform Switches RSB" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches OCTOPUS: all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Classic Platform Switches OCTOPUS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RS: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Classic Platform Switches RS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MS: all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Classic Platform Switches MS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH100: all versions", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Classic Platform Switches MACH100" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSR: all versions", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Classic Platform Switches RSR" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH1000: all versions", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Classic Platform Switches MACH1000" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH4000: all versions", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Classic Platform Switches MACH4000" } ], "category": "vendor", "name": "Hirschmann Automation and Control GmbH, Belden Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5465", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. CVE-2018-5465 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5465" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5467", "cwe": { "id": "CWE-598", "name": "Use of GET Request Method With Sensitive Query Strings" }, "notes": [ { "category": "summary", "text": "An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. CVE-2018-5467 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5467" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5471", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5471 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5461", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5461 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5461" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5469", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. CVE-2018-5469 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
cnvd-2018-04781
Vulnerability from cnvd
Title: 多款Belden Hirschmann交换机产品暴力破解漏洞
Description:
Belden Hirschmann RS等都是美国Belden公司的交换机产品。
多款Belden Hirschmann交换机产品中的Web界面存在安全漏洞,该漏洞源于程序未能正确的限制身份验证请求的次数。攻击者可利用该漏洞暴力破解身份验证。
Severity: 高
Formal description:
厂商尚未提供漏洞修复方案,请关注厂商主页更新: http://www.hirschmann.com/
Reference: https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01
Name | ['Belden Hirschmann RS', 'Belden Hirschmann RSR', 'Belden Hirschmann RSB', 'Belden Hirschmann MACH100', 'Belden Hirschmann MACH1000', 'Belden Hirschmann MACH4000', 'Belden Hirschmann MS', 'Belden Hirschmann OCTOPUS'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-5469" } }, "description": "Belden Hirschmann RS\u7b49\u90fd\u662f\u7f8e\u56fdBelden\u516c\u53f8\u7684\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u4e2d\u7684Web\u754c\u9762\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u9650\u5236\u8eab\u4efd\u9a8c\u8bc1\u8bf7\u6c42\u7684\u6b21\u6570\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u66b4\u529b\u7834\u89e3\u8eab\u4efd\u9a8c\u8bc1\u3002", "discovererName": "Ilya Karpov\uff0cEvgeniy Druzhinin\uff0cMikhail Tsvetkov\u548cDamir Zainullin", "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttp://www.hirschmann.com/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-04781", "openTime": "2018-03-09", "products": { "product": [ "Belden Hirschmann RS", "Belden Hirschmann RSR", "Belden Hirschmann RSB", "Belden Hirschmann MACH100", "Belden Hirschmann MACH1000", "Belden Hirschmann MACH4000", "Belden Hirschmann MS", "Belden Hirschmann OCTOPUS" ] }, "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "serverity": "\u9ad8", "submitTime": "2018-03-08", "title": "\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u66b4\u529b\u7834\u89e3\u6f0f\u6d1e" }
var-201803-1818
Vulnerability from variot
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. plural Belden Hirschmann The product contains a security feature vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. BeldenHirschmannRS and other are the switch products of the Belden company in the United States. A security vulnerability exists in the web interface in several BeldenHirschmann switch products due to the number of times the program failed to properly limit authentication requests. Multiple Belden Products are prone to the following security vulnerabilities. 1. Session Hijacking Vulnerability 2. An information-disclosure vulnerability 3. A security-bypass vulnerability 4. A security weakness vulnerability 5. Successfully exploiting this issue may lead to further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1818", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "hirschmann mach104-16tx-poep -r", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -e", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -r-l3p", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -e", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -e-l3p", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -r-l3p", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -r", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x-l3p", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -e-l3p", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann rs", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann rsr", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann rsb", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach100", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach1000", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach4000", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann ms", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann octopus", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-080900t5t5tnebhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008024b4btrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-train-bp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600m2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-8poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010001s1strephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-001000t5t5tafuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2ttsaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-train", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8tp-rj45", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-080802t6t6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010001m1mtrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-train-bp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008021a1atrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-f", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008024a4atrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-24tp-f", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800eccp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2tttaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-081602o6o6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-8 poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-train", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 5tx eec", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900nnm4tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsr20", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2tttaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-081000t5t5tffuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-000900t5t5tnebhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-train-bp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-081000t5t5tneuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008021b1btrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsr30", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8tx-eec", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-081602t6t6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8tx poe-eec", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2ttsaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-8poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os3x-xx24xxx", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-r", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2l2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2ttsaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8sfp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600eccp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010004m4mtrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f-4poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2s2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-train", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2tttaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-6poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-fr-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8mm-sc", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900vvm2tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8sm-sc", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2s2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-0802saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010004s4strephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os3x-xx16xxx", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600m2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-001000t5t5tneuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2tttaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-0802saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2ttsaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-1602saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-24tp-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-080900t5t5tffbhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-000900t5t5tafbhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os34", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-080802o6o6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900mmm2tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "rsr", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "rsb", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "rs", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "octopus", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "ms", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach4000", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach1000", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach100", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 0900mmm2tdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 0900nnm4tdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 0900vvm2tdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600l2l2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600l2m2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600l2s2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600l2t1sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600m2m2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600m2t1sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600s2m2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600s2s2sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rs20 1600s2t1sdau", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsr20", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsr30", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800m2m2saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800m2m2saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800m2m2taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800m2m2taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800s2s2saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800s2s2saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800s2s2taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800s2s2taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800t1t1saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800t1t1saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800t1t1taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0800t1t1taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900m2ttsaab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900m2ttsaabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900m2tttaab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900m2tttaabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900mmm2saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900mmm2saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900mmm2taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900mmm2taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900s2ttsaab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900s2ttsaabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900s2tttaab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900s2tttaabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900vvm2saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900vvm2saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900vvm2taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900vvm2taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900zzz6saab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900zzz6saabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900zzz6taab", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann rsb20 0900zzz6taabe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann m1 8mm sc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann m1 8sfp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann m1 8sm sc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann m1 8tp rj45", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 24tp f", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 24tp fr", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 8tp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 8tp f", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 8tp fr", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach102 8tp r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x e l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep 2x r l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep e l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 16tx poep r l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 20tx f", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 20tx f 4poe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 20tx f l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 20tx fr", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach104 20tx fr l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g 3x l2p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g 3x l3e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g 3x l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g l2p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g l3e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 24g l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g 3x l2p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g 3x l3e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g 3x l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g l2p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g l3e", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann mach4002 48g l3p", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 0800eccp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 0800saae", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 0800saap", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 1600eccp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 1600saae", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms20 1600saap", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms30 0802saae", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms30 0802saap", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann ms30 1602saae", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 16m", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 16m 8poe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 16m train", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 16m train bp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 24m", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 24m 8 poe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 24m train", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 24m train bp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 5tx eec", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8m", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8m 6poe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8m 8poe", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8m train", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8m train bp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8tx eec", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus 8tx poe eec", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 000900t5t5tafbhh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 000900t5t5tnebhh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 0010001m1mtrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 0010001s1strephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 0010004m4mtrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 0010004s4strephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 001000t5t5tafuhb", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os20 001000t5t5tneuhb", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os24 080900t5t5tffbhh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os24 080900t5t5tnebhh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os24 081000t5t5tffuhb", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os24 081000t5t5tneuhb", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os30", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os30 0008021a1atrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os30 0008021b1btrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os30 0008024a4atrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os30 0008024b4btrephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os32 080802o6o6tpephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os32 080802t6t6tpephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os32 081602o6o6tpephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os32 081602t6t6tpephh", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os34", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os3x xx16xxx", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "hirschmann octopus os3x xx24xxx", "version": null } ], "sources": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNNVD", "id": "CNNVD-201803-137" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:belden:hirschmann_mach100", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_mach1000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_mach4000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_ms", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_octopus", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rs", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rsb", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rsr", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002740" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ilya Karpov, Evgeniy Druzhinin, Mikhail Tsvetkov, and Damir Zainullin of Positive Technologies.", "sources": [ { "db": "BID", "id": "103340" } ], "trust": 0.3 }, "cve": "CVE-2018-5469", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-5469", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2018-04781", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "e2e4d831-39ab-11e9-8398-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-5469", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5469", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-5469", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-04781", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-137", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNNVD", "id": "CNNVD-201803-137" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. plural Belden Hirschmann The product contains a security feature vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. BeldenHirschmannRS and other are the switch products of the Belden company in the United States. A security vulnerability exists in the web interface in several BeldenHirschmann switch products due to the number of times the program failed to properly limit authentication requests. Multiple Belden Products are prone to the following security vulnerabilities. \n1. Session Hijacking Vulnerability\n2. An information-disclosure vulnerability\n3. A security-bypass vulnerability\n4. A security weakness vulnerability\n5. Successfully exploiting this issue may lead to further attacks", "sources": [ { "db": "NVD", "id": "CVE-2018-5469" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "BID", "id": "103340" }, { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5469", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-18-065-01", "trust": 3.3 }, { "db": "BID", "id": "103340", "trust": 1.9 }, { "db": "CNVD", "id": "CNVD-2018-04781", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-137", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002740", "trust": 0.8 }, { "db": "IVD", "id": "E2E4D831-39AB-11E9-8398-000C29342CB1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNNVD", "id": "CNNVD-201803-137" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "id": "VAR-201803-1818", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" } ], "trust": 1.55476865375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" } ] }, "last_update_date": "2024-11-23T22:26:25.940000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.hirschmann.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002740" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.0 }, { "problemtype": "CWE-254", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-065-01" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/103340" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5469" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5469" }, { "trust": 0.3, "url": "https://www.belden.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNNVD", "id": "CNNVD-201803-137" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04781" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "db": "CNNVD", "id": "CNNVD-201803-137" }, { "db": "NVD", "id": "CVE-2018-5469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-09T00:00:00", "db": "IVD", "id": "e2e4d831-39ab-11e9-8398-000c29342cb1" }, { "date": "2018-03-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-04781" }, { "date": "2018-03-06T00:00:00", "db": "BID", "id": "103340" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "date": "2018-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-137" }, { "date": "2018-03-06T21:29:00.393000", "db": "NVD", "id": "CVE-2018-5469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-04781" }, { "date": "2018-03-06T00:00:00", "db": "BID", "id": "103340" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002740" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-137" }, { "date": "2024-11-21T04:08:51.743000", "db": "NVD", "id": "CVE-2018-5469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-137" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Belden Hirschmann Vulnerabilities related to security functions in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-137" } ], "trust": 0.6 } }
fkie_cve-2018-5469
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA25D40E-1E3F-41AB-8BC9-0A364A211183", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED7F69C-9D7E-4D3E-8FC8-046591B8F72C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "A389F6F0-D56E-49C9-B4AD-CCD8DD4A2450", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "49911A4F-A21E-491C-8A03-6E4144DE42D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "738724A7-562C-4807-A317-B5C5428932AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA39FF33-6E6A-4691-9C40-560723CBFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FB971E8-2607-46BC-84C1-F3D34E44C3E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1460D64-8DE5-471B-A503-2D87892C79BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "1981C282-9207-4868-9F23-6DD8807BB229", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "E26E3E61-E84D-4800-BDF6-0B4A2F499363", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA008C7-B4CD-4C34-AF56-ECD8C24DB505", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0C5D3E8-A3BB-44FB-A987-83FAD4CC9A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06C03EE-24A8-4ADE-9B14-5FAAD35E65DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2BF0F4-230F-44AA-85EE-28B8240B2ACF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CD83F89-EB97-4B8F-9DC2-73B730A76EE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A8048B-558C-4741-BD88-D2D3CF74CB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA8B637-D6A9-4DF4-824B-C53CA7A8ABEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B18896-D580-424F-9C4E-82E2EBAD844B", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "2178F642-0E69-43F0-8F8F-2C87C981DCB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "578326FE-F0FB-47EB-A44F-206BD251D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BEFAE2-3CC3-4DCC-A8C3-9F8DB2B004D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F708D57-48A5-4F53-AB50-15F367358162", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D218119-49DA-47D3-96E8-AD953B9A47C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEA69C3A-0E18-4917-89C8-A7DA275533E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51E0C67-B998-4C68-84E7-2B38A93B6FBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC13B1DA-0E50-4D07-91E6-E7A07A0E2069", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A850722-6D89-4C42-B20D-407A8E7D9A2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "25B98DD9-FB55-4AE5-90E9-10A4BCAA9F81", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "043062F8-E093-43D7-8509-63480874592D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC3ECF-51F0-4A7C-A43D-3E2D4E72D818", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4A1209-27A8-4C95-BD40-C9AA727CFA0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F15FC0F-489C-4D45-9BC8-F3F86E0A3AC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "2888785F-D3D7-41E9-A5C6-5D7ED53DE14F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "853F8602-9DCA-4801-89DB-840FECF6280A", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "54DE1A99-1AA9-4A43-BD7C-3E22A2A5BA09", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "738EB5DB-F9F0-4524-A22A-8A7950C27A8E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "509B1762-6301-4A27-9D9B-B136F6AAB4CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF4F4DA6-0372-4AD2-BFC1-050017DEA887", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "15219A3B-F7E7-4CA9-8309-B67EA6966CD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4714290B-3E4E-4F33-B8A1-9A829785A898", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A4550-3156-41A7-BBF2-F8A4286758CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "58196E57-6427-4173-9619-528F03CD5B05", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8322D0-3114-4492-9BF7-3E666CBE6611", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "9819AE5A-8C0D-4EE9-815A-B2769C83C380", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B9C8AA-1E8A-4146-8EB6-1BE9C594B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "66E497A2-AC8F-408A-85BE-65845498FB4C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B195204E-8B95-4BE1-B235-1E2FD95A44AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A9821B-8D5D-4A5F-AED5-74A0703529CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A75E6D-B73E-45B7-8705-95208F235D28", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*", "matchCriteriaId": "65C99A74-7C85-4416-9E9C-3CBA79585736", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DE3CE-B99F-4E03-BDD1-C23396DF50F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0BA8D9-D4ED-4CDE-8E3D-F6079899E0FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAE9CE3-0207-4314-8C4A-84A6AD3BF235", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0D747D9-EDD2-4090-B32F-3C9822E4A56C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC40955F-D5EB-4B31-A7D1-058E02C417FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C923E962-ECE4-4F23-91C3-5A617D52D4B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D7ADAB-28A7-4D2B-8662-9E90EFCD8151", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "1893F2D7-F48D-411E-BB7C-B7AF2C44EFF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEFE82AD-A5F9-4072-8CBC-20BC6D1CD6F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A497238D-1115-40E2-B043-EB896FED267D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "39554286-44A3-4652-B669-DA14CD20B441", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D64AA359-B1AF-417B-AA93-349E52A7966E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "47EE024D-162D-419F-A177-327BBF42BAFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "76CCBC08-CEDB-4461-80B8-9A8C7AC618B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5281211-E32D-412C-8689-82FC4549C40E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D5198B-B500-4C91-8E0D-8B95B51B71BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A82CD8-A4A4-4157-91BB-8D6A2BBB0D51", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7115757B-7460-4B54-98E5-4F520DD56A0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8F39B9B-FAAC-43BE-9647-97D54FB52507", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "59AB7716-CEC7-4A27-8875-09253E9AC237", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E597300-89BD-4200-965A-A486ABD7B4B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "F11DB049-5577-4B6E-897E-5C18C62B41D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2903B36-E3B5-4767-8075-859C00F2E402", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8386501-2E1F-401C-BFFA-6B53B6BFF8E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1D3786-C6D0-4A17-AD47-0B182C6F7A04", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E9F068-8B2C-4865-AE12-5AB4E8E1F946", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F1CE066-1223-458C-A543-1D142539FCF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAE8E9CE-EA78-43BF-9A6A-87D0352CF4DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FC03833-B05B-4E56-9E58-072C850F3057", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB9E695-1706-4D9D-8E10-212B75CD560D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF89542-FF92-4429-B314-4AFC765FDFD0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4792860A-8E90-40E5-985C-C1FB11588E7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E815F4A6-9097-4ABE-88BD-5014BE6A5513", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "48FEC97C-495B-40E8-BEDF-948EEC41752C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "026D719B-4E41-4C32-B0E3-728A35A6706D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FD6BEB-9943-42BB-B62E-5B3C91092B57", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "9129B33A-8EE8-4194-A5CD-E8049B99A6B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD1A12E5-373D-441E-B04C-8F95F088B344", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F5B3B29-8E0D-488C-BB3B-EC0A8A3DBC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CB3DCC1-63DE-4B99-894E-3F5C23437850", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "01CDE07E-9970-421D-A148-896743C7DFCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "7047E947-36E6-4A26-BC23-28C65B50C356", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "630F1410-FFB4-489B-9964-351145426399", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEF8E02-FAA3-492F-BB1E-1FF4BDF4C608", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA9093BA-0B42-4097-9A1A-84DE32DED2F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD6950F-C91B-4627-A047-5122C04C04B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA3B0BE-5AFB-469D-A0D9-EAB0577595FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "13F4375F-CA06-4839-8CCB-9E9246DDEE7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B5D6811-AD13-4C0A-99DB-7D4179757168", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7070C13-DA62-4D85-A64F-5111A242A8EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8FB2BC-2BE3-4024-AD6A-A2BBA3B29493", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "44E11B95-E12C-49BD-A312-CF1BF8118E7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "88902682-B211-4736-B364-BEFDA768B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*", "matchCriteriaId": "1445388A-F752-4953-9F89-BE3660617B31", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "28FF7C3E-5021-4C82-A238-041A1FD71201", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "431FC180-BCA1-4F98-8D18-A0CE08E10756", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "A26D3EC9-DFE5-4AD0-ADDF-6F508B6E3744", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0063F51-2F98-4DE8-880C-D7076B0DCD7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "87074D73-9674-478E-9377-A9C6C523D2E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "875DC5B6-B977-42E7-8713-A9FD0C48F104", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4C975-724F-426A-8056-6EE02B22F282", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4596FAB-8105-441B-B3AC-EDAED7C7F735", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "64276F67-CEDA-4445-A337-79133794D592", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "5100DA61-83DD-4413-A8EC-20BEB30BA0C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F4DE6A-2688-4F1D-BEFA-BE932F637BFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "D281C363-DD4E-452B-ABCC-4EA336B17C37", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D85D07B-2EBE-478E-B5FE-975EFD0AADE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B2024F2-7CB2-40A2-B464-B4C3AA74104D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B207FE2-DE97-48E5-92DA-F936A679B08F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "58CBF64A-49BE-44D2-8381-05147A54FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "063E67B4-2F80-4762-BEF2-B3A8897C0B36", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4918054-F180-48D4-B294-BA25074D2EA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE08D58E-44A1-48A1-986E-D66FB728D60C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA034B1A-CD20-4033-ADFB-BC7F13D23AAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "C971FE83-B5B2-4855-94AD-F8C4E844D204", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E175432-5BCF-4402-8087-3A9F126A12C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4580A2-26D9-469B-BCEB-F565D757902F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "068E6AEF-D20C-4D5D-9DF5-293DA5A42534", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF21DEC7-DDDD-477A-957A-0FDD52522A6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73D7F90-BD0C-4C6C-AAB0-A006AD2F6158", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "D967C151-6D54-4649-9019-03E8C501FCEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5BDA02A-B7E4-4217-9E56-01A88F944B2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "600871CF-FB70-48DC-8AD0-DFB2EC08A45F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E755EDB6-832D-42EA-91D7-FFD76443C336", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication." }, { "lang": "es", "value": "Se ha descubierto un problema de restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de restricci\u00f3n indebida de autenticaci\u00f3n excesiva en la interfaz web que podr\u00eda permitir que un atacante se autentique mediante fuerza bruta." } ], "id": "CVE-2018-5469", "lastModified": "2024-11-21T04:08:51.743", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-06T21:29:00.393", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.