Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-5471 (GCVE-0-2018-5471)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Hirschmann Automation and Control GmbH Classic Platform Switches |
Version: Hirschmann Automation and Control GmbH Classic Platform Switches |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103340", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103340" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Hirschmann Automation and Control GmbH Classic Platform Switches", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } ], "datePublic": "2018-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-10T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "103340", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103340" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches", "version": { "version_data": [ { "version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "103340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103340" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-5471", "datePublished": "2018-03-06T21:00:00", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-08-05T05:33:44.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-5471\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-03-06T21:29:00.440\",\"lastModified\":\"2024-11-21T04:08:52.027\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema de transmisi\u00f3n de informaci\u00f3n sensible en texto claro en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n sensible en texto claro en la interfaz web que podr\u00eda permitir que un atacante obtenga informaci\u00f3n sensible mediante un ataque Man-in-the-Middle (MitM) exitoso.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA25D40E-1E3F-41AB-8BC9-0A364A211183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED7F69C-9D7E-4D3E-8FC8-046591B8F72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A389F6F0-D56E-49C9-B4AD-CCD8DD4A2450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49911A4F-A21E-491C-8A03-6E4144DE42D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738724A7-562C-4807-A317-B5C5428932AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA39FF33-6E6A-4691-9C40-560723CBFB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB971E8-2607-46BC-84C1-F3D34E44C3E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1460D64-8DE5-471B-A503-2D87892C79BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1981C282-9207-4868-9F23-6DD8807BB229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26E3E61-E84D-4800-BDF6-0B4A2F499363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA008C7-B4CD-4C34-AF56-ECD8C24DB505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C5D3E8-A3BB-44FB-A987-83FAD4CC9A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06C03EE-24A8-4ADE-9B14-5FAAD35E65DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2BF0F4-230F-44AA-85EE-28B8240B2ACF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD83F89-EB97-4B8F-9DC2-73B730A76EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A8048B-558C-4741-BD88-D2D3CF74CB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA8B637-D6A9-4DF4-824B-C53CA7A8ABEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B18896-D580-424F-9C4E-82E2EBAD844B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2178F642-0E69-43F0-8F8F-2C87C981DCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578326FE-F0FB-47EB-A44F-206BD251D2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BEFAE2-3CC3-4DCC-A8C3-9F8DB2B004D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F708D57-48A5-4F53-AB50-15F367358162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D218119-49DA-47D3-96E8-AD953B9A47C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA69C3A-0E18-4917-89C8-A7DA275533E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51E0C67-B998-4C68-84E7-2B38A93B6FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC13B1DA-0E50-4D07-91E6-E7A07A0E2069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A850722-6D89-4C42-B20D-407A8E7D9A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B98DD9-FB55-4AE5-90E9-10A4BCAA9F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"043062F8-E093-43D7-8509-63480874592D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACCC3ECF-51F0-4A7C-A43D-3E2D4E72D818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4A1209-27A8-4C95-BD40-C9AA727CFA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F15FC0F-489C-4D45-9BC8-F3F86E0A3AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2888785F-D3D7-41E9-A5C6-5D7ED53DE14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853F8602-9DCA-4801-89DB-840FECF6280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54DE1A99-1AA9-4A43-BD7C-3E22A2A5BA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738EB5DB-F9F0-4524-A22A-8A7950C27A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509B1762-6301-4A27-9D9B-B136F6AAB4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4F4DA6-0372-4AD2-BFC1-050017DEA887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15219A3B-F7E7-4CA9-8309-B67EA6966CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714290B-3E4E-4F33-B8A1-9A829785A898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7A4550-3156-41A7-BBF2-F8A4286758CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58196E57-6427-4173-9619-528F03CD5B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8322D0-3114-4492-9BF7-3E666CBE6611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9819AE5A-8C0D-4EE9-815A-B2769C83C380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B9C8AA-1E8A-4146-8EB6-1BE9C594B4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E497A2-AC8F-408A-85BE-65845498FB4C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B195204E-8B95-4BE1-B235-1E2FD95A44AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A9821B-8D5D-4A5F-AED5-74A0703529CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09A75E6D-B73E-45B7-8705-95208F235D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C99A74-7C85-4416-9E9C-3CBA79585736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"945DE3CE-B99F-4E03-BDD1-C23396DF50F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0BA8D9-D4ED-4CDE-8E3D-F6079899E0FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAE9CE3-0207-4314-8C4A-84A6AD3BF235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0D747D9-EDD2-4090-B32F-3C9822E4A56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC40955F-D5EB-4B31-A7D1-058E02C417FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C923E962-ECE4-4F23-91C3-5A617D52D4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D7ADAB-28A7-4D2B-8662-9E90EFCD8151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1893F2D7-F48D-411E-BB7C-B7AF2C44EFF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEFE82AD-A5F9-4072-8CBC-20BC6D1CD6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A497238D-1115-40E2-B043-EB896FED267D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39554286-44A3-4652-B669-DA14CD20B441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-e-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D64AA359-B1AF-417B-AA93-349E52A7966E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EE024D-162D-419F-A177-327BBF42BAFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\\\+2x_-r-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CCBC08-CEDB-4461-80B8-9A8C7AC618B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5281211-E32D-412C-8689-82FC4549C40E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D5198B-B500-4C91-8E0D-8B95B51B71BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A82CD8-A4A4-4157-91BB-8D6A2BBB0D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7115757B-7460-4B54-98E5-4F520DD56A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F39B9B-FAAC-43BE-9647-97D54FB52507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59AB7716-CEC7-4A27-8875-09253E9AC237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E597300-89BD-4200-965A-A486ABD7B4B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11DB049-5577-4B6E-897E-5C18C62B41D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2903B36-E3B5-4767-8075-859C00F2E402\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8386501-2E1F-401C-BFFA-6B53B6BFF8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1D3786-C6D0-4A17-AD47-0B182C6F7A04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g\\\\+3x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E9F068-8B2C-4865-AE12-5AB4E8E1F946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1CE066-1223-458C-A543-1D142539FCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE8E9CE-EA78-43BF-9A6A-87D0352CF4DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC03833-B05B-4E56-9E58-072C850F3057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB9E695-1706-4D9D-8E10-212B75CD560D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF89542-FF92-4429-B314-4AFC765FDFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g\\\\+3x-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4792860A-8E90-40E5-985C-C1FB11588E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E815F4A6-9097-4ABE-88BD-5014BE6A5513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FEC97C-495B-40E8-BEDF-948EEC41752C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026D719B-4E41-4C32-B0E3-728A35A6706D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1FD6BEB-9943-42BB-B62E-5B3C91092B57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9129B33A-8EE8-4194-A5CD-E8049B99A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1A12E5-373D-441E-B04C-8F95F088B344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5B3B29-8E0D-488C-BB3B-EC0A8A3DBC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB3DCC1-63DE-4B99-894E-3F5C23437850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CDE07E-9970-421D-A148-896743C7DFCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7047E947-36E6-4A26-BC23-28C65B50C356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630F1410-FFB4-489B-9964-351145426399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEF8E02-FAA3-492F-BB1E-1FF4BDF4C608\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9093BA-0B42-4097-9A1A-84DE32DED2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD6950F-C91B-4627-A047-5122C04C04B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA3B0BE-5AFB-469D-A0D9-EAB0577595FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F4375F-CA06-4839-8CCB-9E9246DDEE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B5D6811-AD13-4C0A-99DB-7D4179757168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7070C13-DA62-4D85-A64F-5111A242A8EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8FB2BC-2BE3-4024-AD6A-A2BBA3B29493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E11B95-E12C-49BD-A312-CF1BF8118E7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88902682-B211-4736-B364-BEFDA768B4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1445388A-F752-4953-9F89-BE3660617B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28FF7C3E-5021-4C82-A238-041A1FD71201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431FC180-BCA1-4F98-8D18-A0CE08E10756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A26D3EC9-DFE5-4AD0-ADDF-6F508B6E3744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0063F51-2F98-4DE8-880C-D7076B0DCD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87074D73-9674-478E-9377-A9C6C523D2E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"875DC5B6-B977-42E7-8713-A9FD0C48F104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4C975-724F-426A-8056-6EE02B22F282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4596FAB-8105-441B-B3AC-EDAED7C7F735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64276F67-CEDA-4445-A337-79133794D592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5100DA61-83DD-4413-A8EC-20BEB30BA0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87F4DE6A-2688-4F1D-BEFA-BE932F637BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D281C363-DD4E-452B-ABCC-4EA336B17C37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D85D07B-2EBE-478E-B5FE-975EFD0AADE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2024F2-7CB2-40A2-B464-B4C3AA74104D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B207FE2-DE97-48E5-92DA-F936A679B08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58CBF64A-49BE-44D2-8381-05147A54FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063E67B4-2F80-4762-BEF2-B3A8897C0B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4918054-F180-48D4-B294-BA25074D2EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE08D58E-44A1-48A1-986E-D66FB728D60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA034B1A-CD20-4033-ADFB-BC7F13D23AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C971FE83-B5B2-4855-94AD-F8C4E844D204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E175432-5BCF-4402-8087-3A9F126A12C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB4580A2-26D9-469B-BCEB-F565D757902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068E6AEF-D20C-4D5D-9DF5-293DA5A42534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF21DEC7-DDDD-477A-957A-0FDD52522A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73D7F90-BD0C-4C6C-AAB0-A006AD2F6158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D967C151-6D54-4649-9019-03E8C501FCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BDA02A-B7E4-4217-9E56-01A88F944B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"600871CF-FB70-48DC-8AD0-DFB2EC08A45F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E755EDB6-832D-42EA-91D7-FFD76443C336\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103340\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/103340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
ghsa-v22v-4gfh-3m25
Vulnerability from github
A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.
{ "affected": [], "aliases": [ "CVE-2018-5471" ], "database_specific": { "cwe_ids": [ "CWE-319" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-06T21:29:00Z", "severity": "MODERATE" }, "details": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.", "id": "GHSA-v22v-4gfh-3m25", "modified": "2022-05-13T01:32:06Z", "published": "2022-05-13T01:32:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5471" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103340" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
cnvd-2018-04782
Vulnerability from cnvd
Title: 多款Belden Hirschmann交换机产品中间人攻击漏洞
Description:
Belden Hirschmann RS等都是美国Belden公司的交换机产品。
多款Belden Hirschmann交换机产品中的Web界面存在安全漏洞,该漏洞源于程序以明文的方式传递敏感信息。攻击者可通过实施中间人攻击利用该漏洞获取敏感信息。
Severity: 中
Formal description:
厂商尚未提供漏洞修复方案,请关注厂商主页更新: http://www.hirschmann.com/
Reference: https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01
Name | ['Belden Hirschmann RS', 'Belden Hirschmann RSR', 'Belden Hirschmann RSB', 'Belden Hirschmann MACH100', 'Belden Hirschmann MACH1000', 'Belden Hirschmann MACH4000', 'Belden Hirschmann MS', 'Belden Hirschmann OCTOPUS'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-5471" } }, "description": "Belden Hirschmann RS\u7b49\u90fd\u662f\u7f8e\u56fdBelden\u516c\u53f8\u7684\u4ea4\u6362\u673a\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u4e2d\u7684Web\u754c\u9762\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u4ee5\u660e\u6587\u7684\u65b9\u5f0f\u4f20\u9012\u654f\u611f\u4fe1\u606f\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5b9e\u65bd\u4e2d\u95f4\u4eba\u653b\u51fb\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "discovererName": "Ilya Karpov\uff0cEvgeniy Druzhinin\uff0cMikhail Tsvetkov\u548cDamir Zainullin", "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttp://www.hirschmann.com/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-04782", "openTime": "2018-03-09", "products": { "product": [ "Belden Hirschmann RS", "Belden Hirschmann RSR", "Belden Hirschmann RSB", "Belden Hirschmann MACH100", "Belden Hirschmann MACH1000", "Belden Hirschmann MACH4000", "Belden Hirschmann MS", "Belden Hirschmann OCTOPUS" ] }, "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "serverity": "\u4e2d", "submitTime": "2018-03-08", "title": "\u591a\u6b3eBelden Hirschmann\u4ea4\u6362\u673a\u4ea7\u54c1\u4e2d\u95f4\u4eba\u653b\u51fb\u6f0f\u6d1e" }
icsa-18-065-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin", "Mikhail Tsvetkov", "Damir Zainullin" ], "organization": "Positive Technologies", "summary": "reporting these vulnerabilities to Belden" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Exploitable remotely/high skill level is needed to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "St. Louis, Missouri", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-065-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-065-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/" } ], "title": "Hirschmann Automation and Control GmbH Classic Platform Switches", "tracking": { "current_release_date": "2018-03-06T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-065-01", "initial_release_date": "2018-03-06T00:00:00.000000Z", "revision_history": [ { "date": "2018-03-06T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSB: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Classic Platform Switches RSB" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches OCTOPUS: all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Classic Platform Switches OCTOPUS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RS: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Classic Platform Switches RS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MS: all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Classic Platform Switches MS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH100: all versions", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Classic Platform Switches MACH100" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSR: all versions", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Classic Platform Switches RSR" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH1000: all versions", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Classic Platform Switches MACH1000" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH4000: all versions", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Classic Platform Switches MACH4000" } ], "category": "vendor", "name": "Hirschmann Automation and Control GmbH, Belden Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5465", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. CVE-2018-5465 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5465" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5467", "cwe": { "id": "CWE-598", "name": "Use of GET Request Method With Sensitive Query Strings" }, "notes": [ { "category": "summary", "text": "An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. CVE-2018-5467 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5467" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5471", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5471 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5461", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5461 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5461" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5469", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. CVE-2018-5469 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSA-18-065-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin", "Mikhail Tsvetkov", "Damir Zainullin" ], "organization": "Positive Technologies", "summary": "reporting these vulnerabilities to Belden" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Exploitable remotely/high skill level is needed to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "St. Louis, Missouri", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "In addition, NCCIC recommends that users take the following measures to protect themselves from social engineering attacks: Do not click web links or open unsolicited attachments in email messages; Refer to Recognizing and Avoiding Email Scams (https://www.cisa.gov/reading_room/emailscams_0905.pdf) for more information on avoiding email scams; Refer to Avoiding Social Engineering and Phishing Attacks (https://www.cisa.gov/cas/tips/ST04-014.html) for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-065-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-065-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-065-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/" } ], "title": "Hirschmann Automation and Control GmbH Classic Platform Switches", "tracking": { "current_release_date": "2018-03-06T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-065-01", "initial_release_date": "2018-03-06T00:00:00.000000Z", "revision_history": [ { "date": "2018-03-06T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSB: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Classic Platform Switches RSB" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches OCTOPUS: all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Classic Platform Switches OCTOPUS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RS: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Classic Platform Switches RS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MS: all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Classic Platform Switches MS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH100: all versions", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Classic Platform Switches MACH100" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches RSR: all versions", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Classic Platform Switches RSR" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH1000: all versions", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Classic Platform Switches MACH1000" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Classic Platform Switches MACH4000: all versions", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Classic Platform Switches MACH4000" } ], "category": "vendor", "name": "Hirschmann Automation and Control GmbH, Belden Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5465", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. CVE-2018-5465 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5465" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5467", "cwe": { "id": "CWE-598", "name": "Use of GET Request Method With Sensitive Query Strings" }, "notes": [ { "category": "summary", "text": "An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. CVE-2018-5467 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5467" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5471", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5471 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5461", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. CVE-2018-5461 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5461" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2018-5469", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. CVE-2018-5469 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Disable HTTP for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the secure HTTPS or SSH protocols for remote management access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use of complex user passwords.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Use the \u201cRestricted Management Access\u201d feature to restrict access to known IP addresses.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Disable remote management access when not in use.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
var-201803-1807
Vulnerability from variot
A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. plural Belden Hirschmann The product contains an information disclosure vulnerability.Information may be obtained. BeldenHirschmannRS and other are the switch products of the Belden company in the United States. Multiple Belden Products are prone to the following security vulnerabilities. 1. Session Hijacking Vulnerability 2. An information-disclosure vulnerability 3. A security-bypass vulnerability 4. A security weakness vulnerability 5. Successfully exploiting this issue may lead to further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1807", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "hirschmann octopus os20-000900t5t5tnebhh", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-8poe", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-train-bp", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8tx poe-eec", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8tx-eec", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-000900t5t5tafbhh", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-6poe", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-train-bp", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 8m-train", "scope": "eq", "trust": 1.6, "vendor": "belden", "version": null }, { "model": "hirschmann rs", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann rsr", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann rsb", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach100", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach1000", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach4000", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann ms", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann octopus", "scope": null, "trust": 1.4, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-080900t5t5tnebhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008024b4btrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600m2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010001s1strephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-001000t5t5tafuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2ttsaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-train", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8tp-rj45", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-080802t6t6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010001m1mtrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-train-bp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008021a1atrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-f", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008024a4atrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-24tp-f", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -r", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -r-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800eccp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2tttaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-081602o6o6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -r", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-8 poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 5tx eec", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900nnm4tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsr20", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800t1t1saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2tttaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-081000t5t5tffuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-081000t5t5tneuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os30-0008021b1btrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsr30", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-081602t6t6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900s2ttsaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -e-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m-8poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os3x-xx24xxx", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp-r", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -e-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2l2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2ttsaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8sfp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-8tp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep -r-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600eccp", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010004m4mtrephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-f-4poe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2s2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900vvm2saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 24m-train", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2tttaabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-20tx-fr-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8mm-sc", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900vvm2tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann m1-8sm-sc", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600l2s2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-0802saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-0010004s4strephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-1600saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os3x-xx16xxx", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600m2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-48g\\+3x-l2p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os20-001000t5t5tneuhb", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2taab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2tttaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x-l3p", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-0802saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800m2m2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900m2ttsaab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x -e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach4002-24g\\+3x-l3e", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900mmm2taabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus 16m", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms30-1602saae", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2t1sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0900zzz6saab", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach102-24tp-fr", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os24-080900t5t5tffbhh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann mach104-16tx-poep \\+2x", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os34", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rsb20-0800s2s2saabe", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann octopus os32-080802o6o6tpephh", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann ms20-0800saap", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-1600s2m2sdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "hirschmann rs20-0900mmm2tdau", "scope": "eq", "trust": 1.0, "vendor": "belden", "version": null }, { "model": "rsr", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "rsb", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "rs", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "octopus", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "ms", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach4000", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach1000", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "mach100", "scope": "eq", "trust": 0.3, "vendor": "belden", "version": "0" }, { "model": "hirschmann rs", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann rsr", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann rsb", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann mach100", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann mach1000", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann mach4000", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann ms", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" }, { "model": "hirschmann octopus", "scope": "eq", "trust": 0.2, "vendor": "belden", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNNVD", "id": "CNNVD-201803-136" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:belden:hirschmann_mach100", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_mach1000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_mach4000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_ms", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_octopus", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rs", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rsb", "vulnerable": true }, { "cpe22Uri": "cpe:/h:belden:hirschmann_rsr", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002741" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ilya Karpov, Evgeniy Druzhinin, Mikhail Tsvetkov, and Damir Zainullin of Positive Technologies.", "sources": [ { "db": "BID", "id": "103340" } ], "trust": 0.3 }, "cve": "CVE-2018-5471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-5471", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2018-04782", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2018-5471", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5471", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-5471", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2018-04782", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201803-136", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNNVD", "id": "CNNVD-201803-136" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. plural Belden Hirschmann The product contains an information disclosure vulnerability.Information may be obtained. BeldenHirschmannRS and other are the switch products of the Belden company in the United States. Multiple Belden Products are prone to the following security vulnerabilities. \n1. Session Hijacking Vulnerability\n2. An information-disclosure vulnerability\n3. A security-bypass vulnerability\n4. A security weakness vulnerability\n5. Successfully exploiting this issue may lead to further attacks", "sources": [ { "db": "NVD", "id": "CVE-2018-5471" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "BID", "id": "103340" }, { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5471", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-18-065-01", "trust": 3.3 }, { "db": "BID", "id": "103340", "trust": 1.9 }, { "db": "CNVD", "id": "CNVD-2018-04782", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-136", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002741", "trust": 0.8 }, { "db": "IVD", "id": "E2E4FF40-39AB-11E9-B6AB-000C29342CB1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNNVD", "id": "CNNVD-201803-136" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "id": "VAR-201803-1807", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" } ], "trust": 1.55476865375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" } ] }, "last_update_date": "2024-11-23T22:26:25.979000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.hirschmann.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002741" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-065-01" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/103340" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5471" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5471" }, { "trust": 0.3, "url": "https://www.belden.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNNVD", "id": "CNNVD-201803-136" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-04782" }, { "db": "BID", "id": "103340" }, { "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "db": "CNNVD", "id": "CNNVD-201803-136" }, { "db": "NVD", "id": "CVE-2018-5471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-09T00:00:00", "db": "IVD", "id": "e2e4ff40-39ab-11e9-b6ab-000c29342cb1" }, { "date": "2018-03-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-04782" }, { "date": "2018-03-06T00:00:00", "db": "BID", "id": "103340" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "date": "2018-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-136" }, { "date": "2018-03-06T21:29:00.440000", "db": "NVD", "id": "CVE-2018-5471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-04782" }, { "date": "2018-03-06T00:00:00", "db": "BID", "id": "103340" }, { "date": "2018-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002741" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-136" }, { "date": "2024-11-21T04:08:52.027000", "db": "NVD", "id": "CVE-2018-5471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Belden Hirschmann Information disclosure vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-136" } ], "trust": 0.6 } }
fkie_cve-2018-5471
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103340 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 | Mitigation, Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA25D40E-1E3F-41AB-8BC9-0A364A211183", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED7F69C-9D7E-4D3E-8FC8-046591B8F72C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "A389F6F0-D56E-49C9-B4AD-CCD8DD4A2450", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "49911A4F-A21E-491C-8A03-6E4144DE42D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "738724A7-562C-4807-A317-B5C5428932AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA39FF33-6E6A-4691-9C40-560723CBFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FB971E8-2607-46BC-84C1-F3D34E44C3E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1460D64-8DE5-471B-A503-2D87892C79BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "1981C282-9207-4868-9F23-6DD8807BB229", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "E26E3E61-E84D-4800-BDF6-0B4A2F499363", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA008C7-B4CD-4C34-AF56-ECD8C24DB505", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0C5D3E8-A3BB-44FB-A987-83FAD4CC9A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06C03EE-24A8-4ADE-9B14-5FAAD35E65DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2BF0F4-230F-44AA-85EE-28B8240B2ACF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CD83F89-EB97-4B8F-9DC2-73B730A76EE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A8048B-558C-4741-BD88-D2D3CF74CB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA8B637-D6A9-4DF4-824B-C53CA7A8ABEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B18896-D580-424F-9C4E-82E2EBAD844B", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "2178F642-0E69-43F0-8F8F-2C87C981DCB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "578326FE-F0FB-47EB-A44F-206BD251D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BEFAE2-3CC3-4DCC-A8C3-9F8DB2B004D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F708D57-48A5-4F53-AB50-15F367358162", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D218119-49DA-47D3-96E8-AD953B9A47C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEA69C3A-0E18-4917-89C8-A7DA275533E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51E0C67-B998-4C68-84E7-2B38A93B6FBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC13B1DA-0E50-4D07-91E6-E7A07A0E2069", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A850722-6D89-4C42-B20D-407A8E7D9A2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "25B98DD9-FB55-4AE5-90E9-10A4BCAA9F81", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "043062F8-E093-43D7-8509-63480874592D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC3ECF-51F0-4A7C-A43D-3E2D4E72D818", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE4A1209-27A8-4C95-BD40-C9AA727CFA0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F15FC0F-489C-4D45-9BC8-F3F86E0A3AC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "2888785F-D3D7-41E9-A5C6-5D7ED53DE14F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "853F8602-9DCA-4801-89DB-840FECF6280A", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "54DE1A99-1AA9-4A43-BD7C-3E22A2A5BA09", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "738EB5DB-F9F0-4524-A22A-8A7950C27A8E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*", "matchCriteriaId": "509B1762-6301-4A27-9D9B-B136F6AAB4CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF4F4DA6-0372-4AD2-BFC1-050017DEA887", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "15219A3B-F7E7-4CA9-8309-B67EA6966CD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4714290B-3E4E-4F33-B8A1-9A829785A898", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A4550-3156-41A7-BBF2-F8A4286758CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "58196E57-6427-4173-9619-528F03CD5B05", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8322D0-3114-4492-9BF7-3E666CBE6611", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "9819AE5A-8C0D-4EE9-815A-B2769C83C380", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B9C8AA-1E8A-4146-8EB6-1BE9C594B4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*", "matchCriteriaId": "66E497A2-AC8F-408A-85BE-65845498FB4C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B195204E-8B95-4BE1-B235-1E2FD95A44AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A9821B-8D5D-4A5F-AED5-74A0703529CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A75E6D-B73E-45B7-8705-95208F235D28", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*", "matchCriteriaId": "65C99A74-7C85-4416-9E9C-3CBA79585736", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "945DE3CE-B99F-4E03-BDD1-C23396DF50F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0BA8D9-D4ED-4CDE-8E3D-F6079899E0FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAE9CE3-0207-4314-8C4A-84A6AD3BF235", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0D747D9-EDD2-4090-B32F-3C9822E4A56C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC40955F-D5EB-4B31-A7D1-058E02C417FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C923E962-ECE4-4F23-91C3-5A617D52D4B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D7ADAB-28A7-4D2B-8662-9E90EFCD8151", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "1893F2D7-F48D-411E-BB7C-B7AF2C44EFF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEFE82AD-A5F9-4072-8CBC-20BC6D1CD6F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A497238D-1115-40E2-B043-EB896FED267D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "39554286-44A3-4652-B669-DA14CD20B441", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D64AA359-B1AF-417B-AA93-349E52A7966E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "47EE024D-162D-419F-A177-327BBF42BAFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "76CCBC08-CEDB-4461-80B8-9A8C7AC618B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5281211-E32D-412C-8689-82FC4549C40E", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D5198B-B500-4C91-8E0D-8B95B51B71BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A82CD8-A4A4-4157-91BB-8D6A2BBB0D51", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7115757B-7460-4B54-98E5-4F520DD56A0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8F39B9B-FAAC-43BE-9647-97D54FB52507", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "59AB7716-CEC7-4A27-8875-09253E9AC237", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E597300-89BD-4200-965A-A486ABD7B4B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*", "matchCriteriaId": "F11DB049-5577-4B6E-897E-5C18C62B41D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2903B36-E3B5-4767-8075-859C00F2E402", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8386501-2E1F-401C-BFFA-6B53B6BFF8E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1D3786-C6D0-4A17-AD47-0B182C6F7A04", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E9F068-8B2C-4865-AE12-5AB4E8E1F946", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F1CE066-1223-458C-A543-1D142539FCF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAE8E9CE-EA78-43BF-9A6A-87D0352CF4DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FC03833-B05B-4E56-9E58-072C850F3057", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB9E695-1706-4D9D-8E10-212B75CD560D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF89542-FF92-4429-B314-4AFC765FDFD0", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4792860A-8E90-40E5-985C-C1FB11588E7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E815F4A6-9097-4ABE-88BD-5014BE6A5513", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "48FEC97C-495B-40E8-BEDF-948EEC41752C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "026D719B-4E41-4C32-B0E3-728A35A6706D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FD6BEB-9943-42BB-B62E-5B3C91092B57", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "9129B33A-8EE8-4194-A5CD-E8049B99A6B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD1A12E5-373D-441E-B04C-8F95F088B344", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F5B3B29-8E0D-488C-BB3B-EC0A8A3DBC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CB3DCC1-63DE-4B99-894E-3F5C23437850", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "01CDE07E-9970-421D-A148-896743C7DFCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "7047E947-36E6-4A26-BC23-28C65B50C356", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*", "matchCriteriaId": "630F1410-FFB4-489B-9964-351145426399", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEF8E02-FAA3-492F-BB1E-1FF4BDF4C608", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA9093BA-0B42-4097-9A1A-84DE32DED2F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD6950F-C91B-4627-A047-5122C04C04B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA3B0BE-5AFB-469D-A0D9-EAB0577595FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "13F4375F-CA06-4839-8CCB-9E9246DDEE7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B5D6811-AD13-4C0A-99DB-7D4179757168", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7070C13-DA62-4D85-A64F-5111A242A8EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8FB2BC-2BE3-4024-AD6A-A2BBA3B29493", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "44E11B95-E12C-49BD-A312-CF1BF8118E7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "88902682-B211-4736-B364-BEFDA768B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*", "matchCriteriaId": "1445388A-F752-4953-9F89-BE3660617B31", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "28FF7C3E-5021-4C82-A238-041A1FD71201", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*", "matchCriteriaId": "431FC180-BCA1-4F98-8D18-A0CE08E10756", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*", "matchCriteriaId": "A26D3EC9-DFE5-4AD0-ADDF-6F508B6E3744", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0063F51-2F98-4DE8-880C-D7076B0DCD7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "87074D73-9674-478E-9377-A9C6C523D2E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*", "matchCriteriaId": "875DC5B6-B977-42E7-8713-A9FD0C48F104", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4C975-724F-426A-8056-6EE02B22F282", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4596FAB-8105-441B-B3AC-EDAED7C7F735", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "64276F67-CEDA-4445-A337-79133794D592", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "5100DA61-83DD-4413-A8EC-20BEB30BA0C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F4DE6A-2688-4F1D-BEFA-BE932F637BFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "D281C363-DD4E-452B-ABCC-4EA336B17C37", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D85D07B-2EBE-478E-B5FE-975EFD0AADE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B2024F2-7CB2-40A2-B464-B4C3AA74104D", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B207FE2-DE97-48E5-92DA-F936A679B08F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*", "matchCriteriaId": "58CBF64A-49BE-44D2-8381-05147A54FBD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "063E67B4-2F80-4762-BEF2-B3A8897C0B36", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4918054-F180-48D4-B294-BA25074D2EA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE08D58E-44A1-48A1-986E-D66FB728D60C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA034B1A-CD20-4033-ADFB-BC7F13D23AAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "C971FE83-B5B2-4855-94AD-F8C4E844D204", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E175432-5BCF-4402-8087-3A9F126A12C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4580A2-26D9-469B-BCEB-F565D757902F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "068E6AEF-D20C-4D5D-9DF5-293DA5A42534", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF21DEC7-DDDD-477A-957A-0FDD52522A6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73D7F90-BD0C-4C6C-AAB0-A006AD2F6158", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*", "matchCriteriaId": "D967C151-6D54-4649-9019-03E8C501FCEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5BDA02A-B7E4-4217-9E56-01A88F944B2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "600871CF-FB70-48DC-8AD0-DFB2EC08A45F", "vulnerable": true }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E755EDB6-832D-42EA-91D7-FFD76443C336", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack." }, { "lang": "es", "value": "Se ha descubierto un problema de transmisi\u00f3n de informaci\u00f3n sensible en texto claro en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n sensible en texto claro en la interfaz web que podr\u00eda permitir que un atacante obtenga informaci\u00f3n sensible mediante un ataque Man-in-the-Middle (MitM) exitoso." } ], "id": "CVE-2018-5471", "lastModified": "2024-11-21T04:08:52.027", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-06T21:29:00.440", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-5471
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-5471", "description": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.", "id": "GSD-2018-5471" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-5471" ], "details": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.", "id": "GSD-2018-5471", "modified": "2023-12-13T01:22:40.364396Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Hirschmann Automation and Control GmbH Classic Platform Switches", "version": { "version_data": [ { "version_value": "Hirschmann Automation and Control GmbH Classic Platform Switches" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "103340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103340" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900nnm4tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900mmm2tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2s2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-0900vvm2tdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2s2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600m2t1sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600s2m2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rs20-1600l2l2sdau:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsr20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800s2s2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2ttsaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800t1t1taabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0800m2m2saab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900m2tttaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900mmm2saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2ttsaab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900s2tttaabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900vvm2taab:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsb20-0900zzz6saabe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-r-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8tp-rj45:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sm-sc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-fr-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-8tp-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach102-24tp-fr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-r-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x_-e-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8mm-sc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_m1-8sfp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-20tx-f-4poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach104-16tx-poep_\\+2x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g\\+3x-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-24g-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l2p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_mach4002-48g\\+3x-l3p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-1602saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms30-0802saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800saap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-0800eccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600saae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ms20-1600eccp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tafuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tffuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tafbhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001m1mtrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021a1atrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008021b1btrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602o6o6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx24xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-081000t5t5tneuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-6poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8m-8poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tffbhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os24-080900t5t5tnebhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-8poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os34:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx-eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_8tx_poe-eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010001s1strephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004s4strephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024b4btrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802t6t6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-081602t6t6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os32-080802o6o6tpephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_5tx_eec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-001000t5t5tneuhb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-000900t5t5tnebhh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os20-0010004m4mtrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_16m-train-bp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-train:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_24m-8_poe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30-0008024a4atrephh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3x-xx16xxx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-5471" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01", "refsource": "MISC", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01" }, { "name": "103340", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103340" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-09T23:41Z", "publishedDate": "2018-03-06T21:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.