CVE-2019-16673
Vulnerability from cvelistv5
Published
2019-12-06 17:08
Modified
2024-08-05 01:17
Summary
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:17:41.032Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T03:02:23",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16673",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2019-018",
              "refsource": "MISC",
              "url": "https://cert.vde.com/en-us/advisories/vde-2019-018"
            },
            {
              "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694",
              "refsource": "CONFIRM",
              "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-339-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16673",
    "datePublished": "2019-12-06T17:08:23",
    "dateReserved": "2019-09-21T00:00:00",
    "dateUpdated": "2024-08-05T01:17:41.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-16673\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-12-06T18:15:12.310\",\"lastModified\":\"2024-11-21T04:30:57.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en los dispositivos Weidmueller IE-SW-VL05M versi\u00f3n 3.6.6 Build 16102415, IE-SW-VL08MT versi\u00f3n 3.5.2 Build 16102415 e IE-SW-PL10M versi\u00f3n 3.3.16 Build 16102416. Las contrase\u00f1as son almacenadas en texto sin cifrar y pueden ser le\u00eddas por cualquiera con acceso al dispositivo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.4\",\"matchCriteriaId\":\"31600141-CFA5-4B40-9F47-993CB2F8EAFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03DE0076-A5C3-4E72-A5ED-713EDEDDA0A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.4\",\"matchCriteriaId\":\"5BB35AB2-4CDE-4B84-999A-AC5EB5DAA73C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6670766-8CBD-4A53-9D3F-E17136D9A814\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"DC7BED61-D523-455A-A1FF-6A05680E2CDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D806FA1-7B64-44E5-9D64-66178A56B4F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"A52D6976-E8D2-4C83-9848-2F9250A1342D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF841D33-FBEE-42F0-A8EB-CDDA860DAA8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"F6B82DD0-4D46-42C9-841B-D688EF6ACB29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E05E0D88-9AE3-46A7-8F1B-81BB8DFC5464\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"511A8784-43FC-4D93-920C-60F504F20D72\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC30CB40-7BD1-4114-A24F-9B1DAF393312\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"D0AF4EC2-25BC-47A1-83ED-E3461D0D6E9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AECD9B17-ED60-4ABF-B446-A4F1A1484562\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"94EAE0D5-CF3F-4E37-AE76-0F5D358ACF6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6418E193-CF24-4944-AC75-1C44A255713E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"8099A916-BEAF-4A47-9AA8-C9370D85E20E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883DE5B8-4C62-4F61-B9BA-E9B3864CDDD9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.4\",\"matchCriteriaId\":\"9A50A1C1-9946-4776-B50B-373DF3E2B131\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED70F72E-4252-413F-A932-443C7FC1E1EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"B99426A8-22E1-42B7-B64F-4BDDA6F17EFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602C4574-71E1-47F6-9ABC-CBDB0CF7C929\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"6BBE8243-D799-40F0-BC62-FEC3F8C9C280\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCA937C-83F8-4D3B-97FC-0FAF8CA60553\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"084DE83C-C05F-463D-B7A0-C536AE588A6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79D17109-4BB6-47DB-A79B-42891EC08850\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"96B8685D-4632-4ED9-BCAC-78D07B110FA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"626BC816-232B-4A44-8871-06AD6A371B11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"B51237F2-8C54-4A87-80BB-B5F05342CE13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82DC99F-7400-4C5A-9C49-A37E97520B15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.2\",\"matchCriteriaId\":\"DA87B5A4-484B-4578-882C-FDC122E3C64C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"806A2E43-E637-4549-8A02-7D1239201C2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"14E7F03A-EC46-43CC-AE07-697A083C6914\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23AC1855-C4B2-4CBE-A4DF-C0B302226ED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"11C6AF35-3559-445E-A944-581983D36C25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D33557C-5627-48F4-846C-88222A2E0FFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"C62C2707-7C86-4BB0-AADF-54C9FCDB0E7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3EDC8E-C9A4-44F4-B051-BCE62F5AC782\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"1D365F92-54F5-44A3-9998-D328ABC018DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848F5B8B-2ED5-42CB-99EF-5259536DDBF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"5E4F56C5-8645-4BEC-B0A7-2B3A11BD60FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFE75E2-BD90-405F-9AFD-4CB9DA7AD72D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.6\",\"matchCriteriaId\":\"48EFF390-0672-4D17-8AA5-EFB1F9BFB7F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F798B662-B55C-40F9-BB92-67AB99FE15EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"225157CE-4339-47C9-87ED-D523598AB713\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D22A334-5E75-48D5-B32D-15FA0ABB94EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"5B6F9B7B-4F31-4A08-857E-ADC3611E6198\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D584992-0479-4920-A9A7-824B79721194\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"37619600-C2D2-468E-A094-450998DDB7F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12AF9DC9-10E7-4729-A0A2-C4916132452B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"B1E99BC2-5DF3-43B4-9C05-6860B6459AFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09766214-250E-4E52-8E88-C854570617D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"B9AFC889-E737-4B3C-B2AB-C6437FB8AB34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C8C05E-8E68-48D0-B12A-94CA3A7E3EFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-vl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5.2\",\"matchCriteriaId\":\"E484798F-642C-4EB3-8909-26691864938E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-vl08mt-6tx-2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B87713BD-1FD1-4AF2-AAA0-D8C2A52B67D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08m-8tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"928B19CB-F3F1-49EB-81E7-47B912F21F34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08m-8tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528D591-87D0-4651-8FE8-5153EB406857\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08mt-8tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"B4B6F5B3-FBDC-4123-8F18-7374EE892633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08mt-8tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686E661E-1F6E-4DC2-AE56-AE5EBF8F344E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"C7CCDDED-2DE6-4E3A-862E-EDD5F42B98F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44487F7E-F3F7-4190-986C-7C6EB9E69CC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"81501C7B-956E-4868-A7EA-7F84883452E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E37C86-ACF8-4B23-80BA-7F6F6833C3D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"55AEA57E-86DD-4CC6-BA3D-11A59B8E1A29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7359E866-099B-4294-8B58-3E8EFEBF7DBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2st_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"6D53938C-F643-4DC8-833F-D38587513037\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0880E5-6DB9-4689-91E0-7F8974176E7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08m-6tx-2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"06ACCCEB-B4BF-4FBF-A73B-835104D8EA1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08m-6tx-2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB34D78-B2A1-4BA6-8C45-58DAC73235C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl08mt-6tx-2scs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.8\",\"matchCriteriaId\":\"86C57E05-AD51-4AD0-87AA-A3E20022BBA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl08mt-6tx-2scs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E25F345-124D-4943-8A81-276E65E960E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl10m-3gt-7tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.16\",\"matchCriteriaId\":\"94B60EDA-B2AF-4B02-8CEE-0EF41CFC088D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl10m-3gt-7tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24092DE5-78A1-483F-A3A9-7C433AC7245E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl10mt-3gt-7tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.16\",\"matchCriteriaId\":\"664C4280-70B2-4ADA-88F7-DC00A75E9A45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl10mt-3gt-7tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDD5858-6F44-4538-A8CA-B2BB752FDC07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl10m-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.16\",\"matchCriteriaId\":\"905BD07A-7C27-42C9-9800-B2FEC7C254D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl10m-1gt-2gs-7tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F7E4BB-3C71-4244-9D21-F868917196BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.16\",\"matchCriteriaId\":\"ECBDC396-B9E0-404D-864F-03E11612286D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-sw-pl10mt-1gt-2gs-7tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD20515-6864-44F3-A039-7D1EBC817044\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2019-018\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://mdcop.weidmueller.com/mediadelivery/asset/900_102694\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-339-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2019-018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://mdcop.weidmueller.com/mediadelivery/asset/900_102694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-339-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.